Infosecurity Interviews
Interview: Bojana Bellamy Discusses GDPR Reform Post-Brexit
The president of the Centre for Information Policy Leadership discusses the UK's plans to reform GDPR
Interview: Will Apple’s Child Safety Measures Harm Individual Privacy?
Om Moolchandani discusses the potential privacy implications of Apple's new child safety technology
Interview: The Impact of the Taliban's Return to Power on Financial Crime
Chris Caruana discusses the potential impact of the Taliban's return to power in Afghanistan on money laundering and financial crime
Q&A: Stuart Peck
Stuart Peck reveals his proudest achievement in the field of cyber and dreams up an 'all-star' infosec project team
Profile Interview: Rupesh Chokshi
Meet Rupesh Chokshi, a self-declared “technologist at heart.” His tenure at AT&T is approaching a quarter of a century, but his passion and commitment remain as resilient as the security mission he champions
Q&A: Larry Whiteside Jr.
Larry Whiteside Jr. gives some straight up advice to industry n00bies and tells us about a time he really upset his boss
Interview: Thinking Outside the Box to Combat Ransomware
Aare Reintam, COO at CybExer Technologies, discusses the evolving nature of ransomware and how to combat this threat
Interview: Partnering to Bring Cyber-criminals to Justice
BT and Interpol explain the importance of collaboration between private companies and law enforcement to bring cyber-criminals to justice
Q&A: Anna-Lisa Miller
Anna-Lisa Miller is the Group CISO for Spectris and is also a member of the ClubCISO community
#PrideMonth: Charles Britt Discusses LGBTQ Representation in Cyber
Charles Britt discusses his new role at Out in Tech and strategies for improving LGBTQ representation in cybersecurity
Q&A: Chani Simms
Chani Simms is an award-winning cybersecurity leader, director of Meta Defence Labs and founder of SHe CISO Exec. platform
Interview: Jonathan Whittle Discusses Plans to Share NHS Patient Data
Jonathan Whittle from Your Lawyers argues that stringent security controls must be implemented to protect individual identities