Infosecurity Interviews
Interview: Mitigating Cyber-Threats in the Maritime Industry
Prof Kevin Jones sets out the specific cyber-threats facing the maritime industry. and how these can be tackled
Interview: (ISC)2's CEO Discusses Cybersecurity's Human Element
(ISC)2's CEO, Clar Rosso, discusses a range of topics, including strategies to close the cyber skills gap
Interview: Analyzing the Hidden Costs of Cybercrime
The longer-term hidden costs of cyber-attacks can be far higher than many realize
Interview: The Role of Hacktivism in the Russia-Ukraine Conflict
What impact have individual hackers and groups had on the Russia-Ukraine conflict so far?
Q&A: Sarah Armstrong-Smith
Eleanor Dallaway gets to know Microsoft's chief security advisor of Microsoft's cybersecurity solutions area, the fantastic Sarah Armstrong-Smith
Interview: The Role of Cyber in the Russia-Ukraine Conflict
What has the Russia-Ukraine conflict shown us about the role of cyber in modern warfare?
Q&A: Camille Stewart
Camille Stewart is nothing shy of an inspiration. In her day job, she brings together Google’s central security team and product security teams to help “secure products that billions of people use to live their lives"
#IWD2022 Interview: Opening Up Opportunities for Women in Tech
Cloudflare co-founder Michelle Zatlyn describes her career journey and initiatives designed to help women develop their careers in cyber and tech
#IWD2022 Interview: The NCSC Discusses Improving Gender Diversity in Cybersecurity
Nicola Hudson, director of policy and communications, NCSC, discusses the body's approach to gender diversity
Profile Interview: Jenny Radcliffe
She’s a professional con artist, a burglar for hire, a world-renowned social engineer, a TED Talks keynote speaker and, as her namesake suggests, a people hacker. She is, of course, Jenny Radcliffe.
Interview: Tackling Evolving Cyber Challenges in Financial Services
The growing use of automation in financial services is leading to a convergence between financial crime and cybercrime
Interview: Cyber-Threats at the Beijing Winter Olympics
How are events like the Beijing Winter Olympics likely to be targeted by cyber threat actors, and how should organizers ramp up their security?