Serge Jorgensen - the sailing CTO of Sylint Group who routinely defends against nation-state attacks on critical infrastructure
Serge Jorgensen is a founding partner and CTO at Sylint Group, where he provides response and remediation guidance on international espionage incidents, cyber-security attacks, and counter cyber-warfare. An engineer by training, he has a bias for action over theory. In this episode, Serge joins the No Password Required team to talk about his time in the industry, his experience coaching sailing at the Paralympic Games, and his favorite childhood toy. Ernie, Jack, and Pablo discuss the cybercriminals that are posing as Twitter employees and journalists to breach academic and Middle East policy data. In the Technologue segment, Pablo teaches the team the history of the world’s largest hacking competition, DEF CON.
Rex Wilson2022-08-25T12:02:56-04:00August 17, 2022|
Episode 24: Dr. Melissa Dark – a cybersecurity education specialist, whose passions include the forest, DIY, and deviled eggs
Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college cybersecurity education for over 20 years, as a professor at Purdue University. In this episode, Dr. Dark joins the No Password Required team to discuss her career in “training the trainers,” the early days of cybersecurity education as an academic subject, and how to encourage cybersecurity awareness among today’s students. Ernie and Jack discuss the Pinellas Park, Florida, cybersecurity analyst alleged to have stolen almost $600,000 in cryptocurrency and how he supposedly did it.
Episode 23: Larry Whiteside Jr. - the motorcycle-riding founder of Cyversity who values mentorship and inclusivity above all else
Larry Whiteside Jr. is the President and Director of Cyversity, an organization whose mission is to achieve consistent representation of women and underrepresented minorities in the cyber industry through programs designed to diversify, educate, and empower. As someone who has experienced the value of mentorship firsthand throughout his life, both as a child and an adult, Larry is passionate about creating a space in the cyber field where everyone is valued and heard. In this episode, Larry joins the No Password Required team to discuss the mentors who helped turn his life around as a teen, the coolest motorcycle-riding character of all time, and the value of honoring every person’s individual perspective in life. Ernie, Jack, and Pablo discuss the potential cyber consequences of the Ukraine conflict. In the Technologue segment, Pablo breaks down the Cloud and its benefits.
Episode 22: Thomas Vaughn - the philosopher CISO of Tallahassee who lives to help other people
Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his career in the Army and then the U.S. Coast Guard, Thomas thrives on helping other people however he can, whether it’s with cybersecurity practices or serving as a volunteer fireman in his spare time. In this episode, Thomas joins the No Password Required team to talk about his journey from the military to cybersecurity, the top-tier candy that he can’t live without, and the philosophical lessons that he carries with him throughout his life. Ernie, Jack, and Pablo discuss the UCF student who created an algorithm to track Elon Musk’s private jet. In the Technologue segment, Pablo explains web tracking and what it means for the everyday internet user.
Episode 21: Chase Fopiano - a kindhearted former police officer who embodies all the qualities of a great leader
Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into the cybersecurity world, and has since carried the lessons he learned during that time into both his life and his career. In this episode, Chase joins the No Password Required team to talk about the moment he decided to make the change to cybersecurity, his passion for learning and how it has helped him succeed, and why Yoda is the character he most relates to in life. Ernie, Jack, and Pablo discuss the cybercrime gang FIN7 and their recent attacks using malicious USB sticks designed to deliver ransomware. In the new Technologue segment, Pablo discusses the Voldemort of cyber-vulnerabilities, Log4j.
Rex Wilson2022-01-28T13:42:52-05:00January 28, 2022|
Episode 20: Debbie Janeczek — Cyber Threat Management Leader at Wells Fargo who has a passion for the Goonies, adventure, and the shores of Lake Superior
Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick, her dog, Jack. In this episode, Debbie joins the No Password Required team to talk about her journey from becoming a Naval Intelligence officer where she hated all things cybersecurity to becoming a leader in the industry thanks to inspiration from the great leaders surrounding her (lucky for us!) Debbie is passionate about practicing mindfulness and embracing nature to maintain a healthy work-life balance and stay grounded in the chaos of the ever-changing cybersecurity world. Ernie and Jack (co-host Jack, not dog Jack) discuss the relaunching of the darknet market AlphaBay by one of the previous founders who escaped the bust in 2017, DeSnake, and the long-standing debate of how exactly to pronounce his name.
Rex Wilson2021-12-09T14:08:07-05:00December 9, 2021|
Each year, cybercriminals try to take advantage of online holiday shoppers through a variety of scams. Keep your holiday season merry and bright by keeping an eye out for these common online shopping scams. This year our mascot, Pixel, gets some great ideas on how to shop safer online.
Asim Fareeduddin — a child of the 1980s with a knack for storytelling, comedic timing, and building an elite cybersecurity team
Asim Fareeduddin is the Vice President of IT Security & Regulatory Controls Assurance at the RELX Group. In addition to his impressive professional resume, Asim is a guy who is never afraid to take a chance – from stand-up comedy to teaching masters-level students at Georgia State University; he’s done it all. In this episode, Asim joins the No Password Required team to talk about how he went from an accountant to Vice President of a global company, how becoming a dad has changed him, and his most cherished accomplishment – high-fiving Busta Rhymes at the 2006 B.E.T. Awards. Ernie and Jack talk about why fist bumps have officially surpassed handshakes as the coolest greeting. More importantly, they discuss cyber workforce development and why right now may be the best time for new workers to join the industry.
Rex Wilson2021-11-16T19:03:38-05:00November 16, 2021|
Even as the federal government has worked to crack down on robocalls, scam texts have boomed in recent years, and that has captured growing attention inside the Federal Communications Commission. More than 47 billion spam texts have been sent so far in 2021, up 55% from the year before, according to an August report from RoboKiller, a spam-blocking company. In 2020, the report estimates, scam texts cost Americans $86 million. The FCC received roughly 14,000 complaints about unwanted text messages in 2020, up 146% from the year before. Already in 2021, the commission has received nearly 10,000 complaints about scam texts.
The NSA wants the military to take cyber vulnerabilities seriously. Almost all American weapons, with the exception of small arms and crew-served weapons (like machine guns), include built-in computer systems. The computers add functionality, including fire control (correcting and adjusting aim against distant or fast-moving targets), navigation (receiving GPS signals), and communications (voice and data transmission). These computers often tie into large, sometimes globe-spanning networks to issue orders, collect data, report enemy sightings, and even coordinate attack or defense among geographically disparate forces. In a world where the Pentagon wants advanced weapons that can wirelessly transfer data to one another, nearly all of them rely on computers, networks, and data links that hackers could exploit.