Infosecurity Interviews
SolarWinds CISO on Developing a More Secure Software Ecosystem After Infamous Hack
SolarWinds’ CISO Tim Brown speaks to Infosecurity about developing a more secure software ecosystem as well as incident response advice for security leaders
New Reddit CISO to Tackle Security Challenges and Champion Diversity
Fredrick “Flee” Lee talks to Infosecurity about how he aims to mitigate privacy and security challenges at the popular social networking site
Brewing a Safer Future: Carlsberg's CISO Talks SASE and Network Security
Carlsberg CISO & Head of Technology, Tal Arad, spoke to Infosecurity about network security and the implementation of SASE Cato Networks
Unlocking Insights from Crypto.com's Cybersecurity Leader
Jason Lau talks to Infosecurity about his appointment to ISACA’s Board of Directors and his top cybersecurity priorities
Leveraging External Attack Surface Management to Reduce Risk
John Stock, discusses Outpost24's acquisition of Sweepatic, which offers an External Attack Surface Management
How New Attack Vectors Force Organizations to Adapt New Identity Security Posture (video)
Drawing on 10+ years of experience at Specops, Darren James explains why new attack vectors force organizations to adapt their identity security posture
#InfosecurityEurope: How Plexal is Tackling the Gender Gap in Cybersecurity Startups (video)
Plexal is trying to address the gap in women-run startups by addressing the pipeline of female talent
#InfosecurityEurope: How to Plan for and Survive a Ransomware Attack (video)
As ransomware operators shift their focus from stealing and extorting data to causing maximum disruption, businesses must build their resilience to cyberattacks
#InfosecurityEurope: A CISOs Guide to Leading a Security Team
Erhan Temurkan discusses how CISOs can enhance the efficiency of their teams in an increasingly challenging environment
#InfosecurityEurope: How Generative AI can be a Force for Good in Cybersecurity (video)
Learn how generative AI can be used to enhance organizations’ cybersecurity
#InfosecurityEurope: Exploring the Key Components of a Zero Trust Network Architecture (video)
A Zero Trust approach to security remains important despite low uptake of the approach
#InfosecurityEurope: The Unique Challenges of Web and Browser Security (video)
With the web and browsers shifting from a consumer tool to an enterprise requirement, these areas have become heavily targeted by threat actors
#InfosecurityEurope: Novel Solutions for Data Management in the Age of Data Collection (video)
In this interview, Blake Brannon of OneTrust, highlights the biggest data compliance and trust challenges for organizations today
#InfosecurityEurope: Hall of Fame Inductee Becky Pinkard Highlights her Career (video)
Infosecurity Europe has selected Becky Pinkard as its Hall of Fame inductee for 2023
#InfosecurityEurope: Modernize Your Threat Management to Stay Ahead of Cybercriminals (video)
Amid surging cyber-attacks and rapid levels of digitization, managing threats and vulnerabilities has never been more challenging
#InfosecurityEurope: LastPass CEO Acknowledges Communication Failings During 2022 Breaches
LastPass CEO, Karim Toubba, told Infosecurity about the lessons the company has taken from the high-profile incident
#InfosecurityEurope: How Organizations can Prevent Data Loss and Tackle Today’s Insider Threats (video)
Next's CSO highlights some of the biggest changes in DLP in recent years and trends relating to insider threats
#InfosecurityEurope: Offensive Security & How to Make Better Decisions with Cyber Risk Quantification (video)
Phillip Wylie discusses how offensive security along with proper remediation can help reduce ransomware and other risks
#InfosecurityEurope: Can We Outnumber Cybercriminals with A Community-Driven Approach? (video)
Hear from CrowdSec how you can strengthen your security posture through a unique crowdsourced approach to threat intelligence
#CRESTCon: Jon Geater Discusses Latest Supply Chain Security Best Practices
Jon Geater outlines how the industry is fighting back to prevent supply chain attacks