Interviews

Read our exclusive interviews with security industry’s renowned gurus and get comprehensive answers to most exciting computer threatscape questions

2021/2022 Cybersecurity Trends, Interview with Jim Bowers, Security Architect at TBI Inc.

David Balaban: It feels like this year has seen numerous, high-profile ransomware attacks – Colonial Pipeline, JSB, etc. What is… Read More

4 years ago

Bruce Schneier on The Matthew Filipowicz Show

This entry reflects a down-to-earth discussion with security guru Bruce Schneier about how the NSA endangers regular PC users while… Read More

12 years ago

Bruce Schneier: NSA is Wasteful and Dangerous

During a podcast on Occupy Radio, the host and a renowned security expert Bruce Schneier get to discuss the NSA… Read More

12 years ago

Interview with Jay Jacobs, Co-Author of Verizon’s Data Breach Investigations Report

As the Principal on Verizon’s RISK team, Jay Jacobs utilizes the VERIS (Vocabulary for Event Recording and Incident Sharing) framework… Read More

12 years ago

Busting Anti-Theft Software Myths: Interview with Simon Roses Femerling

Simon Roses holds a B.S. from Suffolk University (Boston), Postgraduate in e-Commerce from Harvard University (Boston), and an Executive MBA… Read More

12 years ago

An Interview with Dave Kennedy on Artillery, SET, DerbyCon and pentesting

David Kennedy is the founder and CEO of TrustedSec, former CSO for Fortune 1000, former Marine Corps. He is the… Read More

12 years ago

Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey

Jason Healey is the director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and… Read More

12 years ago

Best Practices of Targeted Intrusion Remediation: Interview with Mandiant’s Jim Aldridge

Jim Aldridge of cyber security firm Mandiant helps organizations investigate and respond to security incidents. His areas of expertise include… Read More

12 years ago

InfoSec Blacklist of Charlatans: Interview with Jericho from Errata

As Attrition.org states, Jericho is a security curmudgeon, pimp, helicopter pilot, lighter thief, HTML nazi, cat herder, guinea pig relationship… Read More

12 years ago

A Security Aficionado – Interview with Tom Eston

Tom Eston has many years of experience in penetration testing and security assessments. Currently Tom is the manager of the… Read More

12 years ago