Infosecurity Interviews

  1. Interview: Jon Baines, Mishcon de Reya & Joe Hancock, MDR Cyber

    Looking back at one year of GDPR with data protection and cybersecurity specialists

  2. Interview: Aaron Higbee, Co-Founder and CTO, Cofense

    Infosecurity speaks to Cofense co-founder and CTO Aaron Higbee to explore phishing simulation testing

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  3. Interview: Paul Martini, CEO, iboss

    Infosecurity speaks to iboss co-founder and CEO Paul Martini to discuss all things cloud security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. #RSAC: Video Interview, Kathleen Smith, CyberSecJobs

    Contributing Editor Dan Raywood speaks to Kathleen Smith, CMO of CyberSecJobs

  5. Interview: Alastair Paterson, Co-Founder & CEO, Digital Shadows

    Infosecurity speaks to the co-founder of Digital Shadows for an update on the company’s work and to explore the current state of play of the cyber-threat landscape

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  6. #RSAC: Video Interview, Wendy Nather, Duo Security

    Michael Hill speaks to Duo Security's Wendy Nather about the role people play in security

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  7. #RSAC Video Interview, Bill Budington, EFF

    EFF senior staff technologist Bill Budington talked with Infosecurity about HTTPS, browsers and a more secure internet.

  8. #RSAC Video Interview, Sam Curry, CSO, Cybereason

    Cybereason CSO Sam Curry talked with Infosecurity about security benchmarks, and government leadership in cybersecurity.

  9. #RSAC Video Interview: Ken Munro, Pen Test Partners

    Pen Test Partners' Ken Munro talks to Infosecurity about IoT standards and his research.

  10. #RSAC: Video Interview: Kyla Guru, CEO, Bits N' Bytes Cybersecurity Education

    Kyla Guru, founder and CEO, Bits N' Bytes Cybersecurity Education, talks to Infosecurity Magazine acting editor Michael Hill

  11. #RSAC: Video Interview: Melanie Ensign, Security and Privacy Communications Lead, Uber

    Uber Security and Privacy Communications Lead, Melanie Ensign, talks about creating a culture of security and privacy internally.

  12. #RSAC: Video Interview: Lance Spitzner, director, SANS Institute

    Lance Spitzner talks to Dan Raywood about human behavior, and the debate on the human being the weakest (or strongest) link in security.

  13. #RSAC: Video Interview: Ira Winkler, President, Secure Mentem

    Ira Winkler, president of Secure Mentem, speaks to Infosecurity acting editor Michael Hill at RSA Conference 2019

  14. Interview: Etienne Greeff, SecureData

    Secure Data CTO Etienne Greeff talks about data-driven attack research

  15. Interview: Jonathan Goldberger, VP Global Security, Unisys

    Communicating cybersecurity in the enterprise, the evolving role of the CISO and whether boards need to be more 'cyber-savvy'

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  16. Interview: John Maddison, Executive Vice-President, Products & Solutions, Fortinet

    How the evolution of 4G to 5G mobile networks will impact the digital world

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  17. Interview: Saylor Frase, CEO, Nuspire Networks

    Infosecurity spoke to Saylor Frase, Nuspire CEO, to learn about the company’s 20-year journey

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  18. #InfosecNA18 Video Interview: Hiring & the Cybersecurity Skills Shortage

    We have been talking about the cybersecurity skills shortage for many years now, and reports vary in the numbers of how many vacancies there are now, and will be needed in the years to come.

  19. #InfosecNA18 Video Interview: Driving Awareness to Staff & the Board

    If the employee can be your strongest link, as opposed to the weakest, then it is imperative that security policies and best practises are driven to the company, and that the company is on board with them.

  20. #InfosecNA18 Video Interview: New Network Security Tactics

    Network security has moved on from the perimeter and DMZ, to taking in new tactics like zero trust, as well as using bug bounty programs and red team exercises.

What’s hot on Infosecurity Magazine?