Infosecurity Interviews

  1. #Infosec2024: Dr. Emma Philpott on Cyber Essentials Benefits, Compliance, and Encouragement (video)

    Cyber certifications remain a vital part of cybersecurity, particularly in the context of the IASME Consortium's role as the delivery partner for the UK's Cyber Essentials Scheme

  2. #Infosec2024: Deepfakes, the State of Ransomware today and Cybersecurity Tips (video)

    Jake Moore, Global Cybersecurity Advisor at ESET, dives into the growing threat of deepfakes, analysis of ransomware incidents and shares tips for cybersecurity practitioners

  3. #Infosec2024: How to Achieve High Performance in Cybersecurity and the Psychology Behind It (video)

    Speaking to Infosecurity, Jake Humphrey and Damian Hughes of the High Performance Podcast share the how some of their podcast guests have achieved greatness within their fields and how that relates to the cybersecurity leaders of today

  4. #Infosec2024: Unmasking Deep Scams, the AI-Fueled Fraud Revolution with Mikko Hypponen (video)

    Mikko Hypponen speaks to Infosecurity about the looming threats posed by Artificial Intelligence (AI) in cybersecurity and data privacy

  5. #Infosec2024: Four skills CISOs Need to Excel with Stephen Khan (video)

    Infosecurity speaks to Stephen Khan, a cybersecurity leader with over 20 years of experience, as he is recognized for his contributions to the industry by Infosecurity Europe's Hall of Fame

  6. #Infosec2024: Tackling the Supply Chain Problem Head On with Risk Ledger (video)

    Haydn Brooks, CEO of Risk Ledger examines the problems with traditional supply chain assurance programs and how to better approach them

  7. #Infosec2024: Social Engineering and Romance Scams in the AI Age (video)

    David Clarke is Chief Security Officer at Guildhawk, delves into the ever-evolving world of cyber fraud

  8. #Infosec2024: Why Open Source May Hold the Key to Tackling NVD Overreliance

    Sonatype’s CTO Brian Fox discusses why the open source community has been little impacted by the US National Vulnerability Database backlog

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  9. Kaseya CISO on Preparing Effectively for the Next Cyber Incident

    Kaseya CISO Jason Manar discusses how security leaders can implement the best possible preparations for cyber incidents, and how to increase transparency during these events

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  10. GitHub Deputy CSO: AI Steps Up Security Game in Software Development

    GitHub’s Deputy CSO Jacob DePriest explained how GitHub is using AI to boost open-source security on its platform, and building a consensus to tackle open-source software risks

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  11. New PCI SSC Head Outlines Evolving Payment Security Amid Standards Upgrade

    Gina Gobeyn tells Infosecurity about her immediate priorities following her appointment as Executive Director of the PCI SSC

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  12. GetBusy CISO on How Compliance Has Become a Security Driver

    As the general CISO of a group providing productivity software across different geographies, compliance is top of mind for Luke Kiely

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  13. Data Privacy Week: How to Gain Consumers’ Trust Around Personal Data Use

    The IAPP’s Joe Jones discusses how businesses can improve trust and transparency with consumers around personal data collection and usage

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  14. University of Manchester’s CISO on Managing Major Cyber Incidents

    Heather Lowrie discusses learnings and actions taken following the high-profile cyber-attack on the University of Manchester in 2023

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  15. NCSC's Ollie Whitehouse on Why Cybersecurity is Essential, Not Optional

    The NCSC’s first CTO spoke exclusively to Infosecurity about how UK businesses can improve their cybersecurity posture

    1. Photo of Kevin  Poireault

      Kevin Poireault

      Reporter, Infosecurity Magazine

  16. How TUI Group Strengthened its Third-Party Risk Management

    TUI Group streamlines third-party risk management using SecurityScorecard, enhancing data security and reducing onboarding time

    1. Photo of Beth  Maundrill

      Beth Maundrill

      Editor, Infosecurity Magazine

  17. ISC2 CISO Talks AI, Deepfakes and Managing Cyber Risk

    ISC2 CISO Jon France discusses some of the most pertinent issues in the industry today, including deepfakes and cyber risk management

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  18. Microsoft Hails Generative AI as the Next Security Revolution

    Microsoft tells Infosecurity how new developments with its generative AI tool, Copilot, can enhance security and help fight cybercrime

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  19. #CyberMonth: CISA’s Plan to Create an Enduring Awareness Campaign

    Infosecurity spoke to two CISA experts about the evolving approach to the annual Cybersecurity Awareness Month campaign

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

  20. SolarWinds CISO on Developing a More Secure Software Ecosystem After Infamous Hack

    SolarWinds’ CISO Tim Brown speaks to Infosecurity about developing a more secure software ecosystem as well as incident response advice for security leaders

    1. Photo of James Coker

      James Coker

      Deputy Editor, Infosecurity Magazine

What’s hot on Infosecurity Magazine?