• S4 - Episode 010 – The Making of I AM MACHINE – w/Chris Glanden & Len Noe
    Sep 12 2025
    Description: In this compelling episode of the Cyber Distortion Podcast, hosts Jason sits down with the extraordinary trio behind the groundbreaking documentary I AM MACHINE — a deep dive into the life and mission of transhuman white hat hacker, Len Noe. Known for merging biology with embedded technology, Len’s journey into transhumanism is as provocative as it is visionary. He uses his cybernetic implants not only to push the boundaries of human capability but also as a powerful tool to demonstrate vulnerabilities in both physical and digital security systems. From real-world pen tests to live hacking demos, Len’s ethical hacking blurs the line between man and machine — all in the name of education and awareness. Joining the conversation is director Chris Glanden from Barcode Security, who provides insight into the creative vision behind the documentary and how the concept was brought to life. Kevin, who also served as the film’s editor, gets put in the hot seat by Jason to share his unique perspective on shaping the story from raw footage to finished film. Together, the team explores the challenges, inspirations, and revelations involved in documenting such a futuristic and deeply personal subject. Whether you're fascinated by transhumanism, cybersecurity, or the art of storytelling, this episode unpacks the making of I AM MACHINE from concept to screen — and everything in between. Here are several good resources for listeners to learn more about embedded technology, ethical hacking, and to visit the sites you mentioned. I’ve grouped them by topic so you can explore what interests you most: 🔌 Embedded Technology Resources TI Developer Zone – Embedded Development Texas Instruments provides hardware + software development tools, demos, software libraries & example projects to help developers get started with embedded systems. (Texas Instruments) Embedded.com – Hands‑On Experience Articles, webinars, and practical labs for embedded tech, sensors, microcontroller work – great for seeing how embedded software and hardware interact in real world applications. (Embedded)Embedded Artistry – Resources A curated set of articles, tutorials, libraries, podcasts, and community content for both beginners and those with more experience. Offers insight into best practices, architectures, hardware/software integration. (Embedded Artistry) STMicroelectronics IoT / Embedded ML Platform Free educational resources around embedded systems + machine learning, helping bridge the gap between raw hardware and AI / intelligent embedded systems. (STMicroelectronics)“Awesome Embedded” (Adafruit’s curated list) A big collection of blogs, code, tools, designs, hardware boards, etc., all focused around embedded systems & related tech. (blog.adafruit.com) 🛡 Ethical Hacking / Cybersecurity Resources TryHackMe A platform with guided, hands‑on labs for ethical hacking, useful for beginners and intermediate learners. Offers real‑world style challenges. (slickhacker.com)Hack The Box (HTB) More advanced penetration‑testing style labs and “boxes” that you can hack in a safe environment. Great for up‑skilling. (slickhacker.com)OWASP (Open Web Application Security Project) Very well‑regarded project that publishes tools, frameworks, cheat‑sheets, open source projects (e.g. WebGoat, Juice Shop) and guidance on securing web apps. (slickhacker.com)GitHub — “Awesome Ethical Hacking Resources” repos Repositories like vadymurupa/ethical‑hacking‑resources or hassnainfareed/awesome‑ethical‑hacking‑resources gather lists of books, courses, vulnerable machines, tools, write‑ups, etc. (GitHub) Cyberly Tutorials, guides, and free content on cybersecurity, ethical hacking, privacy, and emerging threats. Great for self‑paced learners. (cyberly.org) 🌐 Websites You Should Definitely Visit I AM MACHINE — https://i‑am‑machine.com The official website for the documentary. Includes information about Len Noe, embedded tech, screenings, news, trailer, etc. (assumed from context).Cyber Circus Network — https://www.cybercircusnetwork.com The network behind Cyber Distortion Podcast and related content. Good place to get more episodes, background, community, and related materials.
    Show More Show Less
    1 hr and 15 mins
  • S4 - Episode 009 – Codewaves Rising – Surfing Latin Americas Talent Tide (w/ Roger Einstoss)
    Aug 7 2025

    Description:

    🎙️ New Episode Alert – Cyber Distortion Podcast 🚨
    Welcome back! In this episode we're diving deep into one of the most pressing challenges in cybersecurity: finding the right talent. Join us for an eye-opening conversation with Roger Einstoss, co-founder of Braintly, a company revolutionizing how organizations source cybersecurity professionals from across Latin America. With decades of experience and a sharp eye for global tech talent, Roger shares insider knowledge on tapping into thriving hubs like Argentina, Brazil, and beyond.

    We explore how Latin America is rapidly emerging as a hotbed for skilled cybersecurity professionals—and why North American companies are increasingly turning south of the border for outsourced expertise. Roger walks us through Braintly’s unique approach to vetting and placing top-tier talent, the challenges companies face in scaling their security teams, and why understanding cultural fit is just as crucial as technical skills.

    Whether you're a CISO looking to grow your team, a tech leader exploring nearshoring options, or simply curious about the evolving cybersecurity workforce, this episode delivers both practical insights and global perspective. Roger's passion for empowering Latin American professionals and building cross-border partnerships is not only inspiring—it’s exactly what the cybersecurity industry needs right now.

    🔗 Don’t miss this one—subscribe now and tune in to the Cyber Distortion Podcast on your favorite platform.

    Connect with Roger here: LinkedIn – Roger Einstoss

    🎧 Featured Guest: Roger Einstoss

    • LinkedIn: https://www.linkedin.com/in/rogereinstoss
    • Twitter/X: (Not publicly listed, but you can search or ask Roger directly)
    • Company Website (Braintly): https://www.braintly.com
    • Braintly on LinkedIn: https://www.linkedin.com/company/braintly

    🌎 Explore Braintly

    Braintly helps companies worldwide connect with top-tier tech and cybersecurity talent across Latin America.

    • 🌐 Homepage: https://www.braintly.com
    • 🔍 Services Overview: https://www.braintly.com#services
    • 📩 Contact Braintly: https://www.braintly.com#contact
    • 📘 Braintly Blog (if available): (Currently no blog listed on homepage—check for updates)

    🧠 Learn More: Latin America's Cybersecurity Talent Landscape

    Here are some external resources you can reference or share to expand on the discussion:

    • 📈 "Why Latin America is the Next Frontier for Tech Talent" – TechCrunch
      https://techcrunch.com/2021/08/24/latin-america-tech-talent
    • 📊 "Cybersecurity Workforce Study" – (ISC)² 2024
      https://www.isc2.org/Research/Workforce-Study
    • 🌍 "Nearshore Outsourcing Trends in 2025" – Nearshore Americas
      https://nearshoreamericas.com
    • 🗺️ "Top Tech Hubs in Latin America: Argentina, Brazil, Mexico" – Globalization Partners
      https://www.globalization-partners.com/blog/tech-hubs-latin-america
    Show More Show Less
    1 hr and 2 mins
  • S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington)
    Jul 29 2025
    This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He’s built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable. In this episode, Ted walks us through his journey from early penetration testing to leading elite security research. We discuss the lessons from Ted’s two influential books: Hackable: How to Do Application Security Right and Inner Hacker. Hackable guides developers, executives, and security teams through building threat models, finding and fixing vulnerabilities early in development, and integrating security into code and culture so organizations can earn trust—and sales. Inner Hacker delves deeper into the hacker mindset: how curiosity, creativity, and rule‑breaking thinking can be applied, not only to cybersecurity, but also to entrepreneurship and personal growth. Finally, Ted reflects on his TED‑X talk “Why You Need to Think Like a Hacker” and delivers ideas from his keynote programs—inviting listeners of Cyber Distortion Podcast to embrace four hacker traits (curiosity, creativity, persistence, and nonconformity) and use them to out-think attackers, address novel threats like AI‑driven deepfakes, and build stronger systems and teams from inside out. Tune in to enjoy a lively, illuminating mix of war stories, strategic insight, and actionable takeaways from one of the most trusted voices in ethical hacking today. CITATIONS & LINKS: 🎙️ Official and Authoritative Links Ted Harrington’s official website (home page) – the main hub for his bio, speaking, books, and more https://www.tedharrington.com 📚 Buy Ted’s Books Purchase Hackable: How to Do Application Security Right on Amazon (ebook/print) – direct link for buying online https://www.podchaser.com/podcasts/hacker-valley-studio-889742/episodes/think-like-a-hacker-solve-like-234696483?utm_source=chatgpt.comPre‑order Inner Hacker (anticipated Summer 2025) via official site waitlist page https://www.tedharrington.com/inner-hacker?utm_source=chatgpt.com 🎤 Talks and Keynotes “Why You Need to Think Like a Hacker” TED‑X Talk – video available via Ted’s speaking page https://www.tedharrington.com/speaking?utm_source=chatgpt.comHacker Valley Studio episode: “Think Like a Hacker, Solve Like a Leader” featuring Ted Harrington – show notes & episode link from a popular cybersecurity podcast https://hackervalley.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington?utm_source=chatgpt.com 🎧 Other Podcasts & Interviews Social‑Engineer.com Podcast Ep. 172 – “Creating Psychological Salt” – Ted Harrington joins Chris Hadnagy to discuss security awareness and his book Hackable https://www.social-engineer.org/podcasts/ep-172-security-awareness-series-creating-psychological-salt-with-ted-harrington/?utm_source=chatgpt.comHuman Factor Security Podcast Ep. 153—Ted Harrington interview – on security as a business advantage, Hackable, and real‑world anecdotes https://humanfactorsecurity.co.uk/episode-153-ted-harrington/?utm_source=chatgpt.com 🔗 Professional Profiles & Media Ted Harrington on LinkedIn – connect and follow his professional updates (often referenced in podcast show notes) hackervalleystudio.podbean.comPodchaser “Cybersecurity Videos” section on his website – demo reels, hacking case studies, keynote previews, and more tedharrington.com
    Show More Show Less
    1 hr and 26 mins
  • S4 - Episode 007 – Reality Distortion is so Freakin’ Real! (w/ Winn Schwartau)
    Jul 1 2025
    In this riveting episode of Cyber Distortion, hosts Kevin Pentecost and Jason Popillion sit down with none other than Winn Schwartau — the legendary cybersecurity pioneer and provocateur known for pulling no punches when it comes to the truth. A trailblazer in information warfare and the original mind behind DEFCON Jeopardy, Winn dives deep into the murky waters of misinformation, disinformation, and the global implications of distorted digital realities. From nation-state psyops to corporate manipulation campaigns, we explore how the war over truth is being waged on battlefields both virtual and real. But it wouldn't be Cyber Distortion without a twist. We wrap the episode with our own chaotic spin on Cyber Distortion Jeopardy, putting Winn — the Godfather of DEFCON Jeopardy himself — back in the hot seat. Expect sharp insights, dark humor, and plenty of digital distortion as we challenge Winn’s wit and memory. Whether you're a cybersecurity veteran or just starting to question what's real in your feed, this episode will leave you thinking twice about the information you trust. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. 🔹 Winn Schwartau – Official & Contact Personal website & contact – Connect directly: “Wanna prove me wrong?” rsaconference.com+10winnschwartau.com+10infoworld.com+10Biography & writings – Details on his books, timeline, awards: thesecurityawarenesscompany.com LinkedIn-like presence via KnowBe4 – Founder & CVO of The Security Awareness Company (now part of KnowBe4): iwc-3.com+2thesecurityawarenesscompany.com+2en.wikipedia.org+2 🔹 Essential Articles & Background on Winn Wired (1996) – Classic article Information Warrior describes his perspective on national cyber threats and “magnetic bombs”: wired.comInfoWorld & Network World – Opinion pieces by Winn on global info‑war and cyber defense: infoworld.com+1networkworld.com+1 🔹 Books by Winn Schwartau Information Warfare: Chaos on the Electronic Superhighway – seminal work on cyberterror thesecurityawarenesscompany.com+5en.wikipedia.org+5dynamicspeakers.com+5 Cybershock, Time Based Security, Terminal Compromise, Analogue Network Security, The Art & Science of Metawar – full catalog available via ThriftBooks rsaconference.com+6thriftbooks.com+6en.wikipedia.org+6 Here’s a direct link where you can purchase Winn Schwartau’s newest book The Art & Science of Metawar, available in paperback: The Art & Science of Metawar (paperback) – listed around $25 used/new‑low via eBay/AbeBooks.You can also purchase or preview it through these official sources:Amazon Paperback & Kindle — Paperback AbeBooks — Used paperback editions, ISBN 0996401946, published August 30, 2024 by Winn Schwartau LLC thriftbooks.com+2abebooks.com+2 🔹 Broader Reading on Misinformation & Disinformation Technology‑Enabled Disinformation (arXiv, 2018) – a rich survey of digital disinformation mechanics and defense strategies: arxiv.orgCambridge Handbook (Chapter: Misinformation, Disinformation & Online Propaganda) – analysis of spread dynamics and trust erosion: cambridge.org+1reddit.com+1Political Behavior (2020) – study on how misinformation‑warnings can backfire (the “tainted truth” effect): link.springer.comLove Letter to America (PDF) – Read it here.Severance (2022) – The show revolves around employees of the mysterious biotechnology corporation Lumon Industries, who have undergone a surgical procedure called "severance" that separates their work memories from their personal life. This means their "innie" (work self) has no knowledge of their "outie" (personal life) and vice versa. Watch it on AppleTV.
    Show More Show Less
    1 hr and 50 mins
  • S4 - Episode 006 – LULZSEC Mastermind Unmasked: The Sabu Story (w/ Hector Monsegur)
    Jun 11 2025
    Welcome back to Cyber Distortion, the show where the shadows of the digital world come into focus. Today’s episode dives deep into the mind of someone who once sat at the center of the internet’s most notorious hacktivist movements. Our guest is Hector Monsegur—better known to some as Sabu—a former leading figure in both Anonymous and LULZSEC, who orchestrated some of the most high-profile cyber-attacks of the early 2010s. From penetrating government networks to being at the heart of a global FBI takedown, Hector’s story is part cautionary tale, part cyber-thriller. In this conversation, he shares it all—raw, unfiltered, and in his own words. We explore what drove him, how the digital threat landscape has evolved, and his take on the current state of cybersecurity, hacktivism, and surveillance. Plug in, patch up, and get ready—today, we’re going behind the mask.Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company. Contact Info: Hector’s LinkedIn: https://www.linkedin.com/in/hxmonsegur/ Link up with Alacrinet: https://www.alacrinet.com/ Here's a curated list of trusted, beginner-friendly, and practical online resources, categorized for easy navigation: 🛠️ Hands-On Learning Platforms 1. TryHackMe 🔗 https://tryhackme.com Interactive, gamified lessons in cybersecurity and hacking.Beginner to advanced levels, covering real-world attack simulations.Great learning paths like Pre-Security and Complete Beginner. 2. Hack The Box (HTB) 🔗 https://www.hackthebox.com Advanced platform for practicing hacking skills legally.Ideal for pentesting, network exploitation, and red teaming.Offers “HTB Academy” with structured learning paths. 3. OverTheWire: Wargames 🔗 https://overthewire.org/wargames/ Classic text-based challenges.Great for beginners learning Linux, networking, and basic hacking logic. 📘 Free Courses & Curriculums 4. Cybrary 🔗 https://www.cybrary.it Free and paid cybersecurity courses, including certifications like CompTIA Security+.Includes job role learning paths. 5. Open Security Training 🔗 http://opensecuritytraining.info In-depth technical training on topics like x86 assembly, exploit development, and reverse engineering.Free and used by industry pros. 6. MIT OpenCourseWare – Computer Systems Security 🔗 https://ocw.mit.edu/courses/6-858-computer-systems-security-fall-2014/ College-level deep dive into systems security.Lectures, slides, and assignments freely available. 📚 Books & Reading 7. Hacking: The Art of Exploitation by Jon Erickson Great for understanding how things work under the hood, including C, assembly, and exploits. 🔗 Available via No Starch Press 8. The Web Application Hacker's Handbook by Dafydd Stuttard & Marcus Pinto Excellent for aspiring bug bounty hunters and web pentesters. 🧠 Communities & Forums 9. Reddit Communities r/netsec – News and discussion about information security.r/AskNetsec – Beginner-friendly Q&A.r/cybersecurity – General news, career advice, and trends. 10. Discord Servers Many Discord servers support TryHackMe and HTB users.Look for “InfoSec Prep” and “CyberMentor’s CyberSec Discord”. 🧑‍💻 YouTube Channels 11. LiveOverflow 🔗 https://www.youtube.com/c/LiveOverflow Deep, technical tutorials in CTFs, binary exploitation, and real-world hacking. 12. The Cyber Mentor 🔗 https://www.youtube.com/@thecybermentor Great for aspiring pentesters. Offers a full free course: Practical Ethical Hacking. 13. John Hammond 🔗 https://www.youtube.com/@_JohnHammond Covers TryHackMe, HTB, malware analysis, and CTFs in an engaging way. 🎓 Certifications to Consider Later CompTIA Security+ – Entry-level security cert.eJPT (eLearnSecurity Junior Penetration Tester) – Beginner-friendly, hands-on.OSCP (Offensive Security Certified Professional) – More advanced, goal for serious pentesters.
    Show More Show Less
    1 hr and 37 mins
  • S4 - Episode 005 – The Art of the HVCK! (w/ Ryan Williams)
    May 5 2025

    In this electrifying episode, we dive deep into the world of hacking, privacy, and offensive security with Ryan Williams, Editor of HVCK Magazine and Director of Smart Cyber Solutions Pty Ltd. Ryan is more than just a cybersecurity consultant—he's a red team enthusiast, blue team strategist, and relentless innovator in the cyber arena.

    We explore Ryan's journey from pen tester to publisher, and uncover the vision behind HVCK Magazine—an online publication dedicated to all things hacking, from OSINT and threat intelligence to offensive tooling and real-world exploits. Learn about his contributions to the community with projects like Commander, MxFlex, AllTheThings, and Flight Freaker, and how these tools are helping redefine modern cybersecurity practices.

    Whether you're an aspiring hacker, seasoned security pro, or just cyber-curious, this episode is packed with insights, inspiration, and a behind-the-scenes look at the evolving hacking landscape.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    🔐 Tune in to hear:

    • How HVCK Magazine is shaping the hacker culture online
    • The power of community-driven security innovation
    • Red vs. Blue: Ryan’s dual mindset in offensive and defensive ops
    • Real talk on bespoke security tooling and Essential Eight uplifts
    • And a few unexpected stories from the field...

    🧠 Stay sharp. Stay curious. Stay distorted.


    Citations:

    🔗 Connect with Ryan Williams

    • LinkedIn: Explore Ryan's professional background and connect with him on LinkedIn.
    • Smart Cyber Solutions: Learn more about his cybersecurity consultancy, Smart Cyber Solutions Pty Ltd, on their Facebook page. ​

    📰 Dive into HVCK Magazine

    • HVCK Magazine Back Issues: Discover the mission and content of HVCK Magazine in this feature on https://hvck-magazine.github.io/
    • HVCK Magazine New Issues: Discover the mission and content of HVCK Magazine in this feature on https://heyzine.com/flip-book/cd19181153.html

    • Contributors' Insights: Read about contributors' experiences and articles in HVCK Magazine, such as this LinkedIn post. ​

    🎧 Related Media & Community

    • YouTube Interview: Watch an in-depth interview with Ryan Williams discussing HVCK Magazine and cybersecurity challenges on YouTube.

    🧠 Explore More in Cybersecurity & Hacking

    • Phrack Magazine: A long-standing publication in the hacking community, available at phrack.org. ​
    • Hakin9 Magazine: Offers articles and resources on IT security and ethical hacking at hakin9.org. ​
    Show More Show Less
    1 hr and 24 mins
  • S4 - Episode 004 – Human IOT: Sub-Molecular DNA Cybersecurity (w/ Dr. Gregory Carpenter)
    Apr 28 2025

    In this electrifying episode of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion dive into the fascinating crossroads of cybersecurity, health, and molecular science with a very special guest — Dr. Gregory Carpenter. Known worldwide for his pioneering research and groundbreaking work at the intersection of biotechnology and cybersecurity, Dr. Carpenter brings a unique and urgent perspective on the growing risks and innovations tied to DNA hacking and cybersecurity at the molecular level.

    Together, they explore how advances in genetics, bioinformatics, and synthetic biology are creating new vulnerabilities — and why protecting health data and even the biological code of life itself has become a critical frontier for cybersecurity professionals. Dr. Carpenter shares real-world insights, discusses current threats and emerging trends, and offers his expert take on where regulation, technology, and human ingenuity must evolve to stay ahead of threats we are only beginning to understand.

    Don’t miss this thought-provoking conversation that bridges the digital and biological worlds — and challenges how we think about security in an era where data isn’t just on servers, but in our very cells. Whether you're a cybersecurity expert, a health industry professional, or just fascinated by where technology is taking us next, this is one episode you won't want to miss!

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    🔗 Citations and Related Links:

    • Biomalware: Malware Encoded in DNA
      Wired – https://www.wired.com/story/malware-dna-hack/
    • Scientists Hack a Computer Using DNA
      MIT Technology Review – https://www.technologyreview.com/2017/08/10/150013/scientists-hack-a-computer-using-dna/
    • Healing the Body with Sound Frequencies
      Donovan Health – https://www.donovanhealth.com/blog/healing-the-body-with-frequencies-the-basics-explained
    • Dire Wolves and Woolly Mammoths: Concerns About Resurrecting Extinct Species
      BBC Future – https://www.bbc.com/future/article/20250425-why-scientists-fear-attempts-to-resurrect-extinct-animals-may-backfire
    • DEFCON Conference (Official Site)
      https://defcon.org/
    • CRISPR and the Threat of Biohacking
      Harvard International Review – https://hir.harvard.edu/crispr-and-the-threat-of-biohacking/
    • Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy
      Frontiers in Bioengineering and Biotechnology – https://www.frontiersin.org/articles/10.3389/fbioe.2019.00020/full
    • The Growing Threat of Biosecurity Risks in Synthetic Biology
      RAND Corporation – https://www.rand.org/pubs/research_reports/RR3027.html
    Show More Show Less
    1 hr and 49 mins
  • S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)
    Apr 10 2025

    In this thought-provoking episode of the Cyber Distortion Podcast, we’re joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world’s first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection.

    As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren’t afterthoughts, but foundations.

    We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof.

    Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet’s earliest innovators on how we can protect who we are—and what we create—online.

    Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don’t Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association.

    Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC).

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

    CITATIONS:

    LinkedIn: https://www.linkedin.com/in/weskussmaul/

    Wes’ Personal Website: https://weskussmaul.com/about-wes/

    Authentiverse: https://authentiverse.net

    Authenticity Alliance:

    https://www.whatisauthenticity.com/

    City of Osmio:

    https://www.osmio.ch/our-name.html

    Buy Wes’ Books:

    https://www.pkipress.com/

    The Authenticity Institute:

    https://www.authenticityinstitute.com/index.html

    More information on Sutton Smith (a.k.a. Sutton Love):

    https://www.reversecanarymission.org/person/sutton-smith-66936d96d1a13a06fe312995

    Sutton’s Instagram:

    https://www.instagram.com/sutton.loves/

    Show More Show Less
    1 hr and 29 mins