News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Victoria Windsor
Victoria Windsor
Moderator, Infosecurity Magazine
Destination Boston! The Journey so Far
Blog
31 Aug 2017
How to Access Finance for your Cyber Security Start-up or Scale-Up
Webinar
28 Jun 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
28 Mar 2016
What’s It Really Like to be a CISO?
Webinar
24 Nov 2015
Intelligent Defence: Collaborative Strategies to Defend Against the Latest Vulnerabilities, Risks and Threats
Webinar
28 Apr 2015
Response and Recovery: Minimising the Impact of an Incident Through Cyber Resilience
Webinar
14 Apr 2015
Intelligent Security: Balancing Information Security Risks and Priorities
Webinar
31 Mar 2015
Implementing Resilient Cybersecurity Incident Detection and Response
Webinar
11 Nov 2014
Mitigating the Social Engineering Threat
Webinar
10 Nov 2014
Protecting sensitive data in the cloud: New approaches to mitigate database security risk
Webinar
21 Aug 2014
Insider Threat Kill Chain: Detecting Human Indicators Of Compromise
Webinar
3 Jul 2014
Infosecurity Europe 2014: Experts Highlight Security as a Business Enabler and Preventing Cyberwar
Blog
22 May 2014
Defending the Modern Network from Targeted Attacks
Webinar
1 Aug 2013
New approaches to effective SCADA cybersecurity
Webinar
9 Apr 2013
Secure Collaboration for the Enterprise - sponsored by Axway & HP
Webinar
6 Dec 2012
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
US Blocks Foreign Governments from Acquiring Citizen Data
News
14 Apr 2025
1
New Malware ResolverRAT Targets Healthcare and Pharma Sectors
News
14 Apr 2025
2
NVD Revamps Operations as Vulnerability Reporting Surges
News
11 Apr 2025
3
Google Cloud: China Achieves “Cyber Superpower” Status
News
10 Apr 2025
4
Google Cloud: Top 5 Priorities for Cybersecurity Leaders Today
News
11 Apr 2025
5
Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024
News
10 Apr 2025
6
NCSC Warns of Spyware Targeting Chinese and Taiwanese Diaspora
News
9 Apr 2025
1
Google Cloud: China Achieves “Cyber Superpower” Status
News
10 Apr 2025
2
NVD Revamps Operations as Vulnerability Reporting Surges
News
11 Apr 2025
3
AI-Powered AkiraBot Evades CAPTCHA to Spam 80,000 Websites
News
10 Apr 2025
4
Digital Certificate Lifespans to Fall to 47 Days by 2029
News
14 Apr 2025
5
Google Cloud: Top 5 Priorities for Cybersecurity Leaders Today
News
11 Apr 2025
6
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
1
The Evolving Ransomware Landscape: A 2025 Survival Guide
Webinar
15 Apr 2025
2
Proactive Incident Response and Recovery: Navigating Ransomware Attacks
Webinar
15 Apr 2025
3
Fireside Chat: How Initial Access Brokers Fuel the Ransomware-as-a-Service Model
Webinar
15 Apr 2025
4
Ransomware Negotiations: Mastering an Attacker’s Mindset and Minimizing Leverage
Webinar
15 Apr 2025
5
How to Update Your PAM Strategy to Protect Hybrid Cloud Infrastructures
Webinar
27 Mar 2025
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6