Infosecurity Interviews

  1. Video Interview: Chris Boyd, Researcher- Malwarebytes

    Chris Boyd, researcher at Malwarebytes talks about the state of ransomware in 2016 and tactics to defeat it with Dan Raywood as part of our 'Live From Infosecurity Europe' video series

  2. Video Interview: Quentyn Taylor, Director of Information Security- Canon Europe

    Quentyn Taylor, director of information security at Canon Europe, talks with Dan Raywood about the skills shortage and challenges faced by the modern security department as part of our 'Live From Infosecurity Europe' video series

  3. Video Interview: Dave Lewis and Martin McKeay- Akamai

    Dave Lewis and Martin McKeay from Akamai discuss battling DDoS attacks and the best tactics to win with Dan Raywood as part of our 'Live From Infosecurity Europe' video series

  4. Video Interview: Remco Postma, VP Sales,EMEA -Device Authority

    Remco Postma, VP of Sales,EMEA for DeviceAuthority discusses being named as the winner of the Cyber Innovation Zone Most Innovative New Company at Infosecurity Europe with Dan Raywood as part of our 'Live From Infosecurity Europe' video series

  5. Video Interview: Brian Honan, CEO -BH Consulting

    Brian Honan, CEO at BH Consulting, discusses being inducted into the Infosecurity Europe Hall of Fame and the state of security in Ireland with Dan Raywood as part of our 'Live From Infosecurity Europe' video series

    1. Photo of Brian Honan

      Brian Honan

      CEO, BH Consulting

  6. Interview: Levison Wood, Army Reservist

    In the first part of my interview with adventurer and author Levison Wood, who had just finished his keynote talk at Infosecurity Europe, I talked with him about his experiences while traveling and dealing with risk and preparing for the worst.

  7. Video Interview: Dr Jessica Barker - Independent Cybersecurity Consultant

    Dr Jessica Barker, independent cybersecurity consultant, discusses her "imposter syndrome" survey and what people in security feel about their achievements with Dan Raywood as part of our 'Live From Infosecurity Europe 2016' video series

    1. Photo of Jessica  Barker

      Jessica Barker

      Cyber Security Consultant, Co-Founder, Co-CEO, Cygenta

  8. #Infosec16: Interview - Levison Wood

    Sitting with him at Olympia, his life experience made me feel rather inadequate, but I was keen to get an impression from someone used to facing risks, what he saw could be a more effective way to deal with risks in the cyber world.

  9. #Infosec16: Interview - The Right Honourable Lord Hague of Richmond

    Deputy Editor Michael Hill sits down with The Right Honourable Lord Hague of Richmond at Infosecurity Europe 2016 to discuss the issue of security versus privacy.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  10. Interview: Ryan Trost, ThreatQuotient

    Trost explained that the venture into the vendor space began in 2013 with his co-founder Wayne Chiang aiming to solve a challenge they had encountered as users.

  11. Interview: Jason Matlof, LightCyber

    BAD in this case stood for “behavioral attack detection” that provides “accurate and efficient security visibility into attacks that have slipped through the cracks of traditional security controls”.

  12. Interview: Richard Gough, Punter Southall

    Talking with Richard Gough, Group IT Operations and Security manager at financial services firm Punter Southall, about his deployment of Duo Security multi-factor authentication.

  13. Interview: James Chappell, CTO and Co-Founder, Digital Shadows

    Digital Shadows announces new additions to its already impressive SearchLight data analysis platform.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. Interview: Orli Gan, Check Point

    Talking with Check Point's head of threat prevention about adopting a prevention over detection model.

  15. Video Interview: Andrew Hay, DataGravity

    Andrew Hay, CISO at DataGravity, discusses buying and using technology with Dan Raywood as part of our 'Live From RSA' video series

  16. Interview: Mike Tierney, Veriato

    As insider threats rise, the technologies to spot and defend against them increase, and it is for this reason why user behavior analytics and activity monitoring software become more popular.

  17. Interview: Alastair Macartney, Suffolk County Council

    In a recent upgrade of email software, Surrey County Council needed to improve collaboration between its 4000 staff and Office 365, but with security remaining at the front of mind.

  18. Interview: Maggie Philbin, Teen Tech

    Maggie Philbin co-founded and runs the initiative Teen Tech, who run one day events to help young people and teenagers see the range of career possibilities in science, engineering and technology.

  19. Interview: Jim Hansen, PhishMe

    The problem in 2016 is that we are still having the same discussion we have always had, that in the last 20-25 years we have focused on boxes and next generation boxes and not woken up to it not working, and that they stop some but not all of it.

  20. Interview: Mike Pittenger, Black Duck Software; Al Nugent, Acquia

    A look at open source software from the perspectives of scanning for vulnerabilities with Black Duck Software, and Acquia CISO Al Nugent on using the software.

What’s Hot on Infosecurity Magazine?