News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Victoria Windsor
Victoria Windsor
Moderator, Infosecurity Magazine
Destination Boston! The Journey so Far
Blog
31 Aug 2017
How to Access Finance for your Cyber Security Start-up or Scale-Up
Webinar
28 Jun 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
28 Mar 2016
What’s It Really Like to be a CISO?
Webinar
24 Nov 2015
Intelligent Defence: Collaborative Strategies to Defend Against the Latest Vulnerabilities, Risks and Threats
Webinar
28 Apr 2015
Response and Recovery: Minimising the Impact of an Incident Through Cyber Resilience
Webinar
14 Apr 2015
Intelligent Security: Balancing Information Security Risks and Priorities
Webinar
31 Mar 2015
Implementing Resilient Cybersecurity Incident Detection and Response
Webinar
11 Nov 2014
Mitigating the Social Engineering Threat
Webinar
10 Nov 2014
Protecting sensitive data in the cloud: New approaches to mitigate database security risk
Webinar
21 Aug 2014
Insider Threat Kill Chain: Detecting Human Indicators Of Compromise
Webinar
3 Jul 2014
Infosecurity Europe 2014: Experts Highlight Security as a Business Enabler and Preventing Cyberwar
Blog
22 May 2014
Defending the Modern Network from Targeted Attacks
Webinar
1 Aug 2013
New approaches to effective SCADA cybersecurity
Webinar
9 Apr 2013
Secure Collaboration for the Enterprise - sponsored by Axway & HP
Webinar
6 Dec 2012
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Ransomware Gangs on Recruitment Drive for Pen Testers
News
19 Nov 2024
1
Cybercriminals Exploit Weekend Lull to Launch Ransomware Attacks
News
20 Nov 2024
2
Swiss Cyber Agency Warns of QR Code Malware in Mail Scam
News
18 Nov 2024
3
Companies Take Over Seven Months to Recover From Cyber Incidents
News
19 Nov 2024
4
Palo Alto Networks Patches Critical Firewall Vulnerability
News
19 Nov 2024
5
Chinese APT Group Targets Telecom Firms Linked to Belt and Road Initiative
News
20 Nov 2024
6
Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors
News
15 Nov 2024
1
watchTowr Finds New Zero-Day Vulnerability in Fortinet Products
News
15 Nov 2024
2
Bank of England U-turns on Vulnerability Disclosure Rules
News
14 Nov 2024
3
AI Threat to Escalate in 2025, Google Cloud Warns
News
13 Nov 2024
4
Surge in DocuSign Phishing Attacks Target US State Contractors
News
18 Nov 2024
5
Swiss Cyber Agency Warns of QR Code Malware in Mail Scam
News
18 Nov 2024
6
How to Manage Your Risks and Protect Your Financial Data
Webinar
30 Oct 2024
1
New Cyber Regulations: What it Means for UK and EU Businesses
Webinar
10 Oct 2024
2
Learn Key Strategies for Industrial Data Security
Webinar
27 Jun 2024
3
Beyond Passwords: Securing the Digital Age with MFA, 2FA, and Passwordless Authentication
Webinar
19 Mar 2024
4
Bouncing Back: Building Organizational Resilience in the Face of Cyber-Attack
Webinar
20 Mar 2024
5
Untangling the Web: Navigating Third-Party Risk in a Hyperconnected World
Webinar
19 Mar 2024
6
Defenders Outpace Attackers in AI Adoption
News
7 Nov 2024
1
ISACA CEO Erik Prusch on AI Fundamentals, Workforce, and Tackling Cybersecurity Challenges
Interview
30 Oct 2024
2
31 New Ransomware Groups Join the Ecosystem in 12 Months
News
8 Oct 2024
3
How Belgium's Leonidas Project Boosts National Cyber Resilience
News Feature
28 Oct 2024
4
Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
Opinion
1 Nov 2024
5
Snowflake Hacking Suspect Arrested in Canada
News
6 Nov 2024
6