S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington)

S4 - Episode 008 – Unleashing Your Inner Hacker (w/ Ted Harrington)

Author: Jason Popillion and Kevin Pentecost July 29, 2025 Duration: 1:25:56

This episode welcomes Ted Harrington, a celebrated ethical hacker, TED‑X keynote speaker, and executive partner at Independent Security Evaluators (ISE). With decades of real‑world experience hacking everything from iPhones and cars to medical devices, cryptocurrency platforms, and password managers, Ted brings unmatched expertise to our conversation. He's built a reputation for uncovering hidden vulnerabilities, helping clients such as Google, Amazon, Netflix, Microsoft, Disney, and Adobe to fix tens of thousands of security flaws—demonstrating why no system is truly unhackable.

 

In this episode, Ted walks us through his journey from early penetration testing to leading elite security research. We discuss the lessons from Ted's two influential books: Hackable: How to Do Application Security Right and Inner Hacker. Hackable guides developers, executives, and security teams through building threat models, finding and fixing vulnerabilities early in development, and integrating security into code and culture so organizations can earn trust—and sales. Inner Hacker delves deeper into the hacker mindset: how curiosity, creativity, and rule‑breaking thinking can be applied, not only to cybersecurity, but also to entrepreneurship and personal growth.

 

Finally, Ted reflects on his TED‑X talk "Why You Need to Think Like a Hacker" and delivers ideas from his keynote programs—inviting listeners of Cyber Distortion Podcast to embrace four hacker traits (curiosity, creativity, persistence, and nonconformity) and use them to out-think attackers, address novel threats like AI‑driven deepfakes, and build stronger systems and teams from inside out.

 

Tune in to enjoy a lively, illuminating mix of war stories, strategic insight, and actionable takeaways from one of the most trusted voices in ethical hacking today.

 

CITATIONS & LINKS:

🎙️ Official and Authoritative Links

  1. Ted Harrington's official website (home page) – the main hub for his bio, speaking, books, and more https://www.tedharrington.com

📚 Buy Ted's Books

  1. Purchase Hackable: How to Do Application Security Right on Amazon (ebook/print) – direct link for buying online https://www.podchaser.com/podcasts/hacker-valley-studio-889742/episodes/think-like-a-hacker-solve-like-234696483?utm_source=chatgpt.com
  2. Pre‑order Inner Hacker (anticipated Summer 2025) via official site waitlist page https://www.tedharrington.com/inner-hacker?utm_source=chatgpt.com

🎤 Talks and Keynotes

  1. "Why You Need to Think Like a Hacker" TED‑X Talk – video available via Ted's speaking page https://www.tedharrington.com/speaking?utm_source=chatgpt.com
  2. Hacker Valley Studio episode: "Think Like a Hacker, Solve Like a Leader" featuring Ted Harrington – show notes & episode link from a popular cybersecurity podcast https://hackervalley.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington?utm_source=chatgpt.com

🎧 Other Podcasts & Interviews

  1. Social‑Engineer.com Podcast Ep.172 "Creating Psychological Salt" – Ted Harrington joins Chris Hadnagy to discuss security awareness and his book Hackable https://www.social-engineer.org/podcasts/ep-172-security-awareness-series-creating-psychological-salt-with-ted-harrington/?utm_source=chatgpt.com
  2. Human Factor Security Podcast Ep.153Ted Harrington interview – on security as a business advantage, Hackable, and real‑world anecdotes https://humanfactorsecurity.co.uk/episode-153-ted-harrington/?utm_source=chatgpt.com

🔗 Professional Profiles & Media

  1. Ted Harrington on LinkedIn – connect and follow his professional updates (often referenced in podcast show notes) hackervalleystudio.podbean.comPodchaser
  2. "Cybersecurity Videos" section on his website – demo reels, hacking case studies, keynote previews, and more tedharrington.com

Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S2 - Episode 013 – CISSP Success Stories with Luke Ahmed – Part II [not-audio_url] [/not-audio_url]

Duration: 1:25:25
Description: 🎙️This is part two of our riveting two-part episode with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popular Facebook page "CISSP E…
S2 - Episode 012 – CISSP Success Stories with Luke Ahmed – Part I [not-audio_url] [/not-audio_url]

Duration: 2:01:44
In this riveting two-part episode, join us as we dive deep into the world of cybersecurity with the extraordinary Luke Ahmed. Luke, a best-selling author, CISSP instructor, and the driving force behind the immensely popu…
S2 - Episode 006 – You ARE the Weakest link! [not-audio_url] [/not-audio_url]

Duration: 1:01:17
A long time in the making, this episode on the importance of User Awareness may just be the most important episode we've released so far. Kevin Pentecost and Jason Popillion are security veterans and Certified Informatio…
S2 - Episode 005 – Third Party Risk – It's not Me, It's You! [not-audio_url] [/not-audio_url]

Duration: 1:20:01
HE'S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall. Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience…