Episodes

  • History of Modern Technology : The 8 inch Floppy
    Sep 16 2025

    professorjrod@gmail.com

    Step back in time with Professor JRod as we uncover the remarkable story of the 8-inch floppy disk – the groundbreaking invention that forever changed how we store and transport digital information.

    Before cloud storage, before USB drives, even before the familiar 3.5-inch diskettes of the 1990s, there was the original 8-inch floppy disk. Born from necessity at IBM in the late 1960s, this revolutionary storage medium solved a critical problem: replacing cumbersome punch cards and tape reels with something more practical and portable. Under project leader Alan Shugart (who later founded Seagate), a dedicated team of engineers crafted the first prototypes, affectionately codenamed "Minnow."

    The journey from concept to commercial success wasn't straightforward. Early challenges with dust and fingerprints damaging disks led to the ingenious solution of housing them in fabric-lined sleeves that would clean the disk surface during operation. By 1973, IBM's read-write floppy drive could store the equivalent of 3,000 punch cards on a single disk – a technological miracle that cost between $5-8 per disk. While laughably limited by today's standards (just over 1 megabyte at maximum capacity), these disks represented an exponential leap forward in portable computing.

    Though the 8-inch floppy was ultimately too unwieldy for home computing, it established the blueprint for all future portable storage. From standardized connectors to formatting approaches, the DNA of these early disks lives on in everything from USB drives to cloud storage concepts. Join us for this fascinating exploration of technological evolution and discover how a simple flexible disk became the ancestor of the digital storage revolution we take for granted today. Subscribe to Technology Tap for more deep dives into the forgotten innovations that shaped our modern digital world.

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    9 mins
  • Cybersecurity Fundamentals : Hacking Humans: The Art of Social Engineering Chapter 2 Part 2
    Sep 14 2025

    Send us a text

    Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ.

    We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach your systems. From physical hardware and network components to applications and human elements, each represents a potential entry point for attackers. We then explore the pathways attackers use to exploit these vulnerabilities, from vulnerable software and network vectors to more devious approaches like lure-based and message-based vectors.

    The episode takes a deep dive into social engineering—the art of manipulating human behavior rather than exploiting technical flaws. Through real-world examples, including my own experience with an attempted password reset scam, we demonstrate how attackers use techniques like impersonation, pretexting, phishing, and business email compromise to bypass even the most sophisticated security systems. One of my students shared how his sister's company lost $10,000 when an attacker impersonated the vacationing CEO and requested a wire transfer—a stark reminder that human vulnerabilities often pose the greatest security risk.

    Whether you're studying for Security+ certification or simply want to better protect yourself and your organization, this episode provides essential insights into the psychological aspects of cybersecurity. Understanding these concepts is crucial not just for IT professionals, but for everyone who uses digital technology. Have you ever encountered a social engineering attempt? How did you recognize and respond to it?

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    23 mins
  • Cybersecurity Fundamentals: Understanding Threat Actors Chapter 2 Part 1
    Sep 6 2025

    Send us a text

    Dive deep into the world of cybersecurity threat actors with Professor J-Rod as we unpack the essential definitions from Chapter 2 of the Security+ 701 certification exam. This knowledge-packed episode breaks down the critical foundation of information security risk management through clear, actionable explanations.

    We start by exploring the trinity of cybersecurity concepts: vulnerability (weaknesses in systems or processes), threats (potential causes of unwanted incidents), and risk (the potential impact when threats exploit vulnerabilities). Understanding the relationship between these concepts—and the formula Risk = Threat × Vulnerability × Impact—provides the framework for all security planning and mitigation strategies.

    The heart of this episode focuses on threat actors—who they are, what motivates them, and how they operate. From script kiddies to sophisticated nation-state actors, from financially-motivated cybercriminals to ideologically-driven hacktivists, we examine the full spectrum of adversaries organizations face today. You'll learn to distinguish between white hat, black hat, and gray hat hackers, understand the dangerous capabilities of Advanced Persistent Threats (APTs), and recognize the unique challenges posed by insider threats who already have legitimate access to your systems.

    Whether you're studying for your Security+ certification or working to strengthen your organization's cybersecurity posture, this episode provides the foundational knowledge needed to identify, classify, and respond to the diverse threat landscape. Complete with practice questions to test your understanding, this guide will help you think like both defender and attacker—a crucial skill in today's digital battlefield. Follow Professor J-Rod on TikTok or email your cybersecurity questions directly to continue your learning journey.

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    23 mins
  • The Mentor Effect
    Sep 2 2025

    Send us a text

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    17 mins
  • Cybersecurity Fundamentals: Unlocking Security+ Chapter 1 Part 2: Controls and Roles
    Aug 22 2025

    Send us a text

    Diving into the foundations of cybersecurity certification, Professor JRod delivers an insightful exploration of CompTIA Security+ Chapter 1, revealing why this certification might actually be more approachable than many believe. Unlike many entry-level IT courses, Security+ builds upon concepts from A+ and Network+, creating a natural progression for those following CompTIA's certification path. For career-changers considering jumping straight to Security+, this episode provides valuable perspective on the assumed knowledge and preparation needed.

    The heart of this episode focuses on security controls – the safeguards and countermeasures organizations implement to protect their information systems. Professor JRod methodically breaks down the five functional categories: preventive controls that stop incidents before they occur, detective controls that identify security breaches, corrective controls that remediate problems, deterrent controls that discourage inappropriate behavior, and compensating controls that provide alternatives when primary controls aren't feasible. He also highlights the often-overlooked sixth category: directive controls that guide and influence secure behavior through policies and procedures.

    Beyond technical concepts, Professor J-Rod emphasizes the organizational structures that support effective security implementation. From the strategic oversight of the CISO to the hands-on work of security engineers and analysts, each role contributes uniquely to the protection of organizational assets. Perhaps most importantly, he stresses that communication skills form the foundation of successful IT security work – a lesson learned early in his career that continues to shape his approach to teaching. The episode concludes with practical application through scenario-based questions that reinforce key concepts, preparing listeners for both certification exams and real-world security challenges.

    Looking to boost your cybersecurity knowledge and prepare for Security+ certification? Follow Professor J-Rod on TikTok for visual explanations of these concepts and join us next time as we continue our exploration of CompTIA Security+ with Chapter 2.

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    26 mins
  • Cybersecurity Fundamentals: Unlocking Security Plus Chapter 1 Part 1
    Aug 20 2025

    Send us a text

    Professor JRod makes a triumphant return to Technology Tap after a year-long hiatus, bringing listeners up to speed on his personal journey and diving straight into Security Plus 701 fundamentals. Having completed his doctorate and subsequently focusing on his health—resulting in an impressive 50-pound weight loss—he reconnects with his audience with the same passion and expertise that made his podcast popular.

    The heart of this comeback episode centers on essential cybersecurity concepts, beginning with the CIA triad (confidentiality, integrity, availability) that forms the foundation of information security. Professor J-Rod expertly breaks down complex frameworks including NIST, ISO/IEC standards, and compliance-driven approaches like HIPAA and GDPR, explaining how organizations should select frameworks based on their specific industry requirements.

    With his trademark clear explanations, he walks listeners through the process of gap analysis—a methodical approach to identifying differences between current security postures and desired standards. The episode then transitions to a comprehensive overview of access control models, including Discretionary, Mandatory, Role-Based, Attribute-Based, and Rule-Based controls, each illustrated with practical examples that bring abstract concepts to life.

    What sets this episode apart is the interactive element, as Professor JRod concludes with practice questions that challenge listeners to apply their newly acquired knowledge. This practical approach bridges the gap between theory and real-world implementation, making complex security concepts accessible to professionals and students alike. Whether you're preparing for certification or simply expanding your cybersecurity knowledge, this return episode delivers valuable insights from an educator who clearly missed sharing his expertise with his audience.

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    26 mins
  • The 2016 Verizon Hack: Lessons in Cybersecurity and Data Protection
    Jul 6 2024

    Send us a text

    Ever wondered how one of the largest telecommunications companies fell victim to a major cyberattack? Join us as cybersecurity students Alexis Severo and Aaron Kispe unravel the infamous Verizon hack of 2016. We kick off our discussion with an insightful look into Verizon's sprawling history and multifaceted services, shedding light on why this tech giant became such a lucrative target for cybercriminals. Discover the gripping narrative of how attackers infiltrated Verizon's enterprise client portal, leading to the unauthorized sale of customer data on the dark web. We'll also cover the chilling aftermath, including a second security flaw that further compromised user accounts by altering email forwarding settings.

    But the conversation doesn't stop at just recounting the breach. We dive deep into actionable strategies to bolster your data security practices and prevent such breaches in the future. From enhancing system monitoring with cutting-edge security information and event management systems to implementing role-based access control and vetting third-party vendors, Alexis and Aaron break down the essentials. Reflecting on lessons learned, we underscore the critical importance of security alert emails and balancing convenience with robust safeguard measures. Plus, stay tuned as we discuss the valuable insights from Verizon's annual data breach investigations report—a must-read for any organization looking to shore up its defenses. Don't miss this eye-opening episode packed with expert advice and real-world lessons in cybersecurity.

    Support the show

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    15 mins
  • The OPM Breach Unveiled: A Deep Dive into the 2013 Cyber Attack on Government Personnel Data
    Jun 28 2024

    Send us a Text Message.

    What happens when the very agency responsible for safeguarding government personnel data becomes the target of an unprecedented cyber attack? Join us on this riveting episode of Technology Tap as we unravel the intricacies of the infamous Office of Personnel Management (OPM) breach. I'm Professor JRod, guiding you through a special summer series episode where we dissect the 2013 cyber intrusion that compromised sensitive federal employee information. With former Navy personnel Michelle, Wesley, and Oksana shedding light on the timeline and implications, this episode offers a rare, personal glimpse into the far-reaching impact of such a breach.

    Listen to Michelle recount her firsthand experience as a victim of the OPM breach and learn how hackers infiltrated the OPM's networks, remaining undetected for months. Discover the alarming vulnerabilities in governmental cybersecurity practices that led to the eventual resignation of OPM Director Katherine Archuleta. Through engaging conversations and detailed analysis, this episode emphasizes the critical need for proactive threat detection and robust data protection measures, making it an essential listen for anyone concerned with the security of personal information in our digital age.

    Support the Show.

    If you want to help me with my research please e-mail me.
    Professorjrod@gmail.com

    If you want to join my question/answer zoom class e-mail me at
    Professorjrod@gmail.com

    Art By Sarah/Desmond
    Music by Joakim Karud
    Little chacha Productions

    Juan Rodriguez can be reached at
    TikTok @ProfessorJrod
    ProfessorJRod@gmail.com
    @Prof_JRod
    Instagram ProfessorJRod

    Show More Show Less
    18 mins