Cybersecurity Journo Requests

Connect with journalists covering cybersecurity. From breaking news to in-depth features, discover relevant media opportunities from top publications in this category.

Never Miss a Cybersecurity Journo Request

Get instant alerts when Cybersecurity journalists post new journo requests. Join the community of sources landing media opportunities daily.

Researchers & Academics - Editorial Chat Infosecurity Europe 2026

Happy weekend! 🙂 What's in my mind today? 🤔 Well, Infosecurity Europe 2026 is around the corner — June 2–4 at ExCeL London — and I'm already booking editorial conversations for the show. This is the part of event coverage I love most. Sitting down with someone in the media room — that one with the view on the Thames — and talking, really talking, at the busy intersection where #technology, #cybersecurity, and #society keep colliding. No script. No product pitch. Just a conversation worth having. I'm opening editorial slots for: non-profits, academics, analysts, researchers, authors, fellow journalists, and subject-matter experts who want to discuss ideas, not products. If you're bringing a perspective, a piece of research, or a question worth sitting with — I want to hear from you. A note: this isn't a sales channel. We have sponsorships, briefings, and brand highlights for that, and we do those well. Editorial means something different. Strike a chord and I'll listen. None of these conversations happen without the incredible team that takes care of all of us at the show — media, speakers, company leaders alike. I cannot wait to get that first smile and hug on June 2nd: Paula Averley, Origin Communications, Alicia Broadest, Vanessa Champion PhD 🧡 Drop your pitch in the comments, or DM me. There's a couch with a view on the Thames — let's sit and talk. Sean Martin Studio C60 / ITSPmagazine #InfosecurityEurope #TechJournalism #InfosecCommunity #SocietyAndTechnology

itspmagazine.com logoitspmagazine.com

Independent Cybersecurity Journalists - State of Cybersecurity Media

Excited to welcome Cole Grolmus to my interview series (Noise2Signal). If the cybersecurity media is broken then it only makes sense to talk to the person who is actually taking steps to fix it. Cole is truly an N of 1. There is no one like him in independent cyber security media. I really enjoy reading his commentary and analysis on cybersecurity companies and the ecosystem. His writing is so good on the companies and categories that I "claim" 😉 to understand that I trust his analysis on companies that I don't understand really well. In this interview we talk about a lot of things. Here are some highlights : - Origins of Strategy of Security, and the initial setbacks. 😅 - The broken state of cyber security media.⛓️💥 - What makes his posts viral? (hint: Nikesh Arora) 🔥 - Which companies will die because of AI? ⚰️ - And finally how cyber security careers will evolvewith AI. Full Episode : https://lnkd.in/epBETyBe As I have said before the goal of these interviews is to educate and inform and bringdifferent perspectives to light. If you are looking for more fear mongering and FUD then you will get NO value from these interviews 😀. Also, if you have interesting insights and stories to tell. Drop me a line. Subscribe to the channel @FromNoise2Signal for new interview updates. I have some amazing interviews lined up. https://lnkd.in/eqNsivtH raison d'etre for the interview series : https://lnkd.in/eAW87UcU

Cybersecurity & Workforce Development Leaders - Systems Gap In Skills

The digital transformation skills shortage is real, but the way we’re addressing it may be missing the mark. There’s a growing conversation around the shortage of digital transformation talent — but I believe we’re framing the problem incorrectly. This isn’t just a talent gap. It’s a systems gap. Across North America, organizations continue to invest heavily in training and education, yet still struggle to find professionals with the right, job-ready skills. At the same time, many graduates are entering the workforce without clear alignment to real-world digital transformation needs. Cybersecurity is a clear example. According to ISC2, the global cybersecurity workforce gap exceeds 4 million professionals — and continues to grow despite ongoing efforts across both Canada and the United States. Frameworks such as the National Initiative for Cybersecurity Education have helped define roles and skills. But defining the problem is only part of the solution — alignment across training, certification, and industry remains inconsistent. What we’re seeing is not just a pipeline issue, but a structural misalignment across the ecosystem: • Training that isn’t fully aligned with industry needs • Skills frameworks that are not consistently adopted • Limited integration between education, certification, and employers If we continue to treat this purely as a hiring challenge, we’ll continue to fall short. I’ve started developing a structured body of work to explore this further — focusing on how workforce development, training systems, and standardization can better align to produce scalable, job-ready talent in cybersecurity and beyond. This is the starting point. Over the coming weeks, I’ll be speaking with professionals across Canada and the U.S. to bring in practical insights and perspectives as I build this into a broader white paper. If you’re working in cybersecurity, workforce development, or training — I’d value your perspective. I’m also looking to feature a select number of contributors as part of this work. Feel free to reach out directly if you’d like to be part of the conversation. #Cybersecurity #DigitalTransformation #WorkforceDevelopment #SkillsGap #FutureOfWork

CIOs & CISOs - AI Security Risks Boards Need to Address

I've been sitting with a question for a few weeks now. We talk about AI and security constantly. But most of that conversation is happening in the wrong room — between practitioners, in technical forums, in vendor briefings. The leaders making investment decisions, setting risk appetite, and signing off on strategy are largely on the outside of it. That bothers me. So I'm working on a series of pieces aimed squarely at the leadership conversation — not the technical one. The goal isn't to simplify the problem. It's to make sure the right people are actually in it. Here's what I'm wrestling with as I build this out: → AI doesn't create new security risks. It exposes the ones organizations already have. Process gaps. Identity vulnerabilities. Decision-making blind spots. The question is whether leaders know which of those they're sitting on. → Shadow AI isn't a security failure. It's a leadership signal. When business teams go around the CIO to adopt AI, that's not recklessness — it's a governance gap showing up in behavior. → When AI flags the threat, AI assists the triage, and AI recommends the response — who owns the decision? And what happens to accountability when no single human made the call? → AI is quietly shifting the balance back toward defenders. Detection times are compressing. Response windows are narrowing. Most boards don't yet see this as a strategic investment argument. They should. → The relationship between the CIO and CISO may be the single biggest determinant of an organization's AI security posture. That conversation is underrated. I have a point of view on all of this. But before I start writing, I want to hear from the people who are living it. What questions do you wish more leaders were asking about AI and security? What's missing from the conversation? What are you seeing inside your own organizations that isn't making it into the public debate? All of it is useful. Drop it in the comments. #CyberSecurity #AIGovernance #CIO #CISO #ArtificialIntelligence #BoardLeadership #RiskManagement #DigitalTransformation #TechnologyLeadership #ShadowAI #CXO #PrivateEquity

Australian ECEC Directors & Providers - Children's Data Privacy Audit

Every ECEC service in Australia collects data about children. Enrolment forms. Developmental records. Medication. Incidents. Daily observations. Photos. More and more of it held not by the service itself, but by third-party platforms they chose, set up, and handed the keys to. Most directors have no idea what happens to that data after it leaves their system. That's not a criticism. It's a structural problem. The platforms are complex, the privacy policies are written for lawyers, and nobody in the sector has sat down and actually measured what these tools do against what Australian law requires. Guarding Little Footprints is a research project auditing the data privacy and security practices of the platforms used in Australian early childhood education and care. Each platform gets assessed against the Australian Privacy Principles, the NIST Cybersecurity Framework, and OWASP application security standards, using only publicly available information. The goal isn't to name and shame. It's to give the sector (directors, approved providers, peak bodies, and regulators) an evidence base they don't currently have. I'll be sharing findings here as the research progresses. If you work in ECEC, advise services, or care about children's data rights, I want to hear from you. Which platforms are you using? What questions do you wish someone would answer? Drop them in the comments. Your experience shapes where this research goes.

Second-Act Executives - Asset Protection & Cybersecurity

Empowering the Executive's Second Act with Capital and Clarity. Are you a leader navigating your professional and financial "Second Act"? 🚀 I'm thrilled to share the latest focus for my podcast, designed to help you break through limitations and plug into your power. We are diving deep into the topics that matter most: 🛡️ Stocks & Asset Protection (Navigating markets with preservation in mind) Securing Your Family’s Financial Future 🔐 Cyber Security for Families (Keeping your loved ones safe online) 💼 Business Preservation & Continuity (Growing and protecting your current or new ventures) Tune in every Wednesday at 9PM PST on [I https://lnkd.in/earAF5as] or search [https://lnkd.in/eRQPG85T to start breaking your chains of old thinking. 🎙️ BE A GUEST ON THE SHOW: We are looking for expert voices in these critical areas! If you’d like to join me for a conversation and share your bio by expertise, contact our Capital & Clarity location at 757-440-3005 to learn more about becoming a guest. 💡 EXPANDING YOUR SUCCESS (IN-PERSON CONSULTATIONS): For immediate, personalized guidance, visit me and my team at our Capital & Clarity location on Merrimac Trail. We offer expert consultations designed to help you: • Retain & Grow: Secure business preservation and gain higher satisfaction. • Expand Your Business: Strategic advice on expanding business networking with top business owners. • Connect with Top Traders: Gain direct connections with some of the top-profile stock traders and many more strategic partners. Let's discuss how we can partner to elevate your vision. #SecondAct #ExecutiveCoaching #AssetProtection #WealthManagement #BusinessSuccess #Entrepreneurship #LinkedInNetworking #DigitalSecurity #FinancePodcast #SecondActExecutive

Inference Engine Maintainers - GGUF Model File GPU Buffer Overflow

I spent the last month auditing the C++ and CUDA internals of vLLM, the most widely deployed open-source LLM inference engine. I found 221 locations where PyTorch's 64-bit tensor metadata is silently truncated to 32-bit int variables before being used in GPU buffer allocations, kernel launch parameters, and loop bounds. The findings were responsibly reported to vLLM . For code paths that process GGUF model files, the tensor dimensions come directly from the model file header. An attacker who crafts a malicious GGUF file and uploads it to a public model hub can trigger a deterministic GPU buffer overflow when a victim loads that model into vLLM. This is not a new class of bug. It is the same integer truncation pattern that has produced 10 CVEs in llama.cpp and Ollama over the past two years. The difference is that nobody has looked for it systematically across the rest of the inference stack. The ML security conversation has been dominated by prompt injection and pickle deserialization. Meanwhile, the C++ and CUDA code that actually parses model files and allocates GPU memory has received almost no attention from the security research community. Model files are not trusted input. They are downloaded from the internet, hosted on public hubs, and parsed by native code with zero validation. This is the same threat model we accepted for images, fonts, and PDFs decades ago. The only thing missing is the formal recognition that it applies to model files too. I submitted both findings to the vLLM security team through coordinated disclosure. They were closed as not meeting their security bar. I respect that decision. I also think it reflects a classification gap, not a technical disagreement. When there is no CWE entry for "memory corruption via crafted model file," it is harder for any maintainer to justify treating these reports as security issues. I have submitted a proposal to MITRE for a new CWE entry to address this gap. Full report (12 pages, proof of concept, CVE comparison tables, reproduction steps):https://lnkd.in/gdDjQAu8 This is part of a broader research effort into memory corruption across the ML inference stack. More findings are in coordinated disclosure and will be published as those processes complete. If you maintain an inference engine or work on ML infrastructure security, I would like to hear from you. #security #llm #vllm #machinelearning #vulnerability #cybersecurity #aiml #gpusecurity #infosec

Smart Grid Experts for Biweekly Knowledge Sharing Series

💡 Exciting Idea: Smart Energy Knowledge Sharing - Seeking Your Input! 💡 Hey network! Close friend of mine is preparing of launching a free, biweekly online series (podcast or webinar) focused on the dynamic world of Smart Metering and Smart Grid technologies. The goal is to create a platform for practical knowledge sharing, emerging trends, and deep dives into the challenges and opportunities shaping the future of energy. 🤔 What I Need From You: I want this to be driven by the expertise in our community. I'm looking to feature industry professionals, technical experts, and thought leaders—that's you! If you have knowledge, insights, case studies, or perspectives on topics like: AMI/AMR deployment challenges Grid modernization and resilience Data analytics and leveraging smart meter data Utility customer engagement Cybersecurity for smart infrastructure Renewable integration and DER management ...or any other hot topic in the smart energy space, I'd love to hear from you. 📣 How to Get Involved: Give me your opinion: Would you attend/listen to a free, biweekly series on these topics? Hit 'Like' or comment 'Yes'! Share your expertise: Are you interested in being a guest speaker or contributor on a topic you're passionate about? Comment 'Speaker' or DM me with a topic you could cover. Suggest a topic: Is there a burning question or niche area in smart metering/grid you want to see covered? Comment below! Let's build a leading knowledge hub together and shine a light on the incredible work being done in this field. Your expertise is invaluable! #SmartGrid #SmartMetering #EnergyTransition #Webinar #Podcast #Utilities #KnowledgeSharing #Innovation

Cyber Insurance Profile Interview Subjects for Assured Intelligence

I’ve been very quiet on LinkedIn since Christmas (JLR cyber insurance post aside…that was a reinitiation by fire!😬🔥). The 📸 of the gorgeous little feet should explain why.♥️ I returned to Assured HQ in September, and didn’t plan on doing an “I’m back!” post because, well, it’s just not very me. But I’ve got a few updates and #JournoRequests so here it is! ▪️ Phil Muncaster did such a great job in my absence that I couldn’t let him go…so we’ve appointed him as Deputy Editor and he will continue to be instrumental for Assured Intelligence. If you’re interested in joining our team of writers, you can contact him on [email redacted]. And if you’re looking to contribute a blog or thought leadership article, those pitches can also go to Phil.  ▪️ It turns out that our readers absolutely love the profile interviews we publish. Which makes me happy because they are my favourite, too. If you would like to put yourself, or someone you know, forward as my next muse, then please DM me.  ▪️We have spokespeople who will give an insanely candid and refreshing view on all things cyber insurance. You may have noted from our posts that we’re not afraid to call things out or give a refreshingly unfiltered take on hot topics - even if it's to our own detriment. Contact me if you ever need a frank and authentic viewpoint.  ▪️Assured is pretty extraordinary. So much so that we’ve tried to keep it on the down-low. But I think the time has come to lift the veil (ever so slightly) on the magic we’ve been creating. In other words, we’re thinking about PR, so if this is something you can help with, please get in touch. Word of warning: we do things differently at Assured, and PR will be no exception. Finally, to all the working parents out there and those who have recently returned from mat/pat leave. The ‘juggle struggle’ is so very real…it’s a rollercoaster. When I keynoted at BSides Belfast in my first week back, I was contacted after my talk by so many people who felt overwhelmed. It is chaos, but maybe that’s just a sign you’re doing big things in more than one world…I wouldn’t have it any other way. But please, send coffee... ☕️ #JournoRequest #PRRequest #Cyberinsurance #CybersecurityPR #MatLeave #BSidesBelfast

assured.co.uk logoassured.co.uk

Never Miss a Cybersecurity Journo Request

Get instant alerts when Cybersecurity journalists post new journo requests. Join the community of sources landing media opportunities daily.