<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Interviews RSS Feed]]></title>
        <link>https://www.cshub.com/rss/interviews</link>
        <description><![CDATA[ Cyber Security Hub ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:54:08 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/interviews" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[How ransomware extortion is evolving]]></title>
                <link>https://www.cshub.com/attacks/interviews/how-ransomware-extortion-is-evolving?utm_medium=RSS</link>
                <description><![CDATA[ Dr Jason Nurse reflects on the changing ransomware extortion landscape and the threat it poses to businesses ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/attacks/interviews/how-ransomware-extortion-is-evolving?utm_medium=RSS</guid>
                <pubDate>Mon, 18 Dec 2023 11:31:08 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to prepare for post-quantum cryptography migration]]></title>
                <link>https://www.cshub.com/threat-defense/interviews/how-to-prepare-for-post-quantum-cryptography-migration?utm_medium=RSS</link>
                <description><![CDATA[ Professor Alan Woodward discusses the importance of post-quantum cryptography and transitioning to quantum-resistant encryption ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/threat-defense/interviews/how-to-prepare-for-post-quantum-cryptography-migration?utm_medium=RSS</guid>
                <pubDate>Thu, 07 Dec 2023 16:37:54 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to improve cyber resilience by evaluating cyber risk]]></title>
                <link>https://www.cshub.com/security-strategy/interviews/how-to-improve-cyber-resilience-by-evaluating-cyber-risk?utm_medium=RSS</link>
                <description><![CDATA[ Discover how to use cyber risk management to develop a cyber resilient mindset from former FBI agent, Miguel Clarke ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/security-strategy/interviews/how-to-improve-cyber-resilience-by-evaluating-cyber-risk?utm_medium=RSS</guid>
                <pubDate>Mon, 20 Nov 2023 00:00:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to overcome the cyber risks posed by medical devices]]></title>
                <link>https://www.cshub.com/attacks/interviews/how-to-overcome-the-cyber-risks-posed-by-medical-devices?utm_medium=RSS</link>
                <description><![CDATA[ How manufacturers can mitigate the cyber security risks of medical devices and ensure patient data stays secure  ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/attacks/interviews/how-to-overcome-the-cyber-risks-posed-by-medical-devices?utm_medium=RSS</guid>
                <pubDate>Tue, 24 Oct 2023 00:00:07 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to ensure effective threat intelligence]]></title>
                <link>https://www.cshub.com/threat-defense/interviews/how-to-ensure-effective-threat-intelligence?utm_medium=RSS</link>
                <description><![CDATA[ Partner at Morrison Foerster, Nate Mendell, on how to overcome common threat intelligence hurdles ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/threat-defense/interviews/how-to-ensure-effective-threat-intelligence?utm_medium=RSS</guid>
                <pubDate>Thu, 07 Sep 2023 08:58:59 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to overcome data security and sovereignty challenges]]></title>
                <link>https://www.cshub.com/cloud/interviews/how-to-overcome-data-security-and-sovereignty-challenges?utm_medium=RSS</link>
                <description><![CDATA[ Key insights on cloud migration, data security and sovereignty and incident response from fellow of cyber security and governance at Singapore University of Social Sciences, Anthony Lim ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/cloud/interviews/how-to-overcome-data-security-and-sovereignty-challenges?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to create an AI strategy for the cloud]]></title>
                <link>https://www.cshub.com/iot/interviews/how-to-create-an-ai-strategy-for-the-cloud?utm_medium=RSS</link>
                <description><![CDATA[ Cloud security architect and cyber security consultant Mayank Sharma shares key insights on cloud migration and how to manage an Internet of Things cyber security strategy ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/iot/interviews/how-to-create-an-ai-strategy-for-the-cloud?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Dispelling the stereotypes about cyber security]]></title>
                <link>https://www.cshub.com/executive-decisions/interviews/dispelling-the-stereotypes-about-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Michelle Garcia, director of IT security and compliance at Carnival Cruises, on why dispelling stereotypes can encourage more women to go into cyber security ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/interviews/dispelling-the-stereotypes-about-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:27 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to encourage diversity in cyber security]]></title>
                <link>https://www.cshub.com/interviews/interviews/how-to-encourage-diversity-in-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Executive director of Women in Cyber Security, Lynn Dohm, shares how to encourage diversity within the industry ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/interviews/interviews/how-to-encourage-diversity-in-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:27 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Why healthcare providers are focusing on cyber resilience]]></title>
                <link>https://www.cshub.com/threat-defense/interviews/why-healthcare-providers-are-focusing-on-cyber-resilience?utm_medium=RSS</link>
                <description><![CDATA[ Cyber Security Hub interviews Jojo Nufable, group IT infrastructure and cyber security head at Metro Pacific Health Solutions, to gain key insight on how those in the healthcare industry are guarding... ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/threat-defense/interviews/why-healthcare-providers-are-focusing-on-cyber-resilience?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[What is the difference between cyber risk management and cyber resilience?]]></title>
                <link>https://www.cshub.com/threat-defense/interviews/what-is-the-difference-between-cyber-risk-management-and-cyber-resilience?utm_medium=RSS</link>
                <description><![CDATA[ Sourabh Haldar, threat policy implementation lead of information and cyber security at Standard Chartered Bank shares key information on threat intelligence strategies ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/threat-defense/interviews/what-is-the-difference-between-cyber-risk-management-and-cyber-resilience?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:05 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Capitalizing on smart investments key to overcoming today’s security challenges]]></title>
                <link>https://www.cshub.com/executive-decisions/interviews/capitalizing-on-smart-investments-key-to-overcoming-todays-security-challenges?utm_medium=RSS</link>
                <description><![CDATA[ Top three cyber threats include growing attack surface, technology debt and complexity according to John Deere’s CISO ]]></description>
                <author><![CDATA[ beth.maundrill@iqpc.co.uk (Beth Maundrill) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/interviews/capitalizing-on-smart-investments-key-to-overcoming-todays-security-challenges?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:27 +0000</pubDate>
            </item>
            </channel>
</rss>