News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Sarb Sembhi
Sarb Sembhi
CTO,
Virtually Informed
Don't Take the Bait: Collaborative Intelligence to Build Phishing Resilience
Webinar
27 Jul 2023
Authentication Security: Crafting a Bulletproof Password Reset Process
Webinar
9 Mar 2023
Can IoT Devices Ever Be Secure?
Webinar
27 Sep 2022
Reducing Industrial Cyber Risk Amid Digital Transformation
Webinar
22 Sep 2022
Reducing Third-Party Identity Risk During the Great Resignation and Beyond
Webinar
5 May 2022
The Challenge of Remote File Transfer Security: Is Centralization the Answer?
Webinar
10 Jun 2021
Mitigating Ransomware Attacks in 2021
Webinar
18 Mar 2021
Securing Remote Access to Critical Infrastructure: The Key to Industrial Digital Transformation
Webinar
3 Sep 2020
Safeguarding Your Digital Transformation with Detection and Response
Webinar
21 May 2020
Authentication Standards in 2019: Why Passwords Remain Problematic, and Future Solutions
Webinar
12 Dec 2019
Security Frameworks: How to Spearhead Careers & Bolster Cyber Defenses
Webinar
27 Jun 2019
Information Theft Attacks: The Cybercriminal's Latest Focus
Webinar
14 Mar 2019
#IMOS18 - A Breach Too Far: Why Data Breaches are Getting Worse
Webinar
12 Sep 2018
Ransomware: Why Protection Is Not Enough
Webinar
21 Sep 2017
Privileged Access Management: Separating People from Passwords
Webinar
16 Mar 2017
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Fraudsters Exploit Telegram’s Popularity For Toncoin Scam
News
22 Apr 2024
1
Vulnerability Exploitation on the Rise as Attackers Ditch Phishing
News
23 Apr 2024
2
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
News
24 Apr 2024
3
DragonForce Ransomware Group Uses LockBit's Leaked Builder
News
25 Apr 2024
4
Fifth of CISOs Admit Staff Leaked Data Via GenAI
News
24 Apr 2024
5
North Korean Hackers Target Dozens of Defense Companies
News
24 Apr 2024
6
North Korean Group Kimsuky Exploits DMARC and Web Beacons
News
17 Apr 2024
1
Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites
News
23 Apr 2024
2
Dependency Confusion Vulnerability Found in Apache Project
News
22 Apr 2024
3
NSA Launches Guidance for Secure AI Deployment
News
22 Apr 2024
4
Banning Ransomware Payments Will Do More Harm Than Good
Opinion
11 Apr 2024
5
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
News
24 Apr 2024
6
Incident Response: Four Key Cybersecurity Measures to Protect Your Business
Webinar
19 Oct 2023
1
Is MFA Enough? Strategies for Next-Level Identity Security in 2024
Webinar
11 Apr 2024
2
Disinformation Defense: Protecting Businesses from the New Wave of AI-Powered Cyber Threats
Webinar
20 Mar 2024
3
Securing APIs in the Cloud Frontier
Webinar
20 Mar 2024
4
Navigating the Evolving Cybersecurity Compliance Landscape in 2024
Webinar
18 Apr 2024
5
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024
6
Infosecurity Magazine Spring Online Summit 2024: Day One
Online Summit
09:45 GMT, 19 Mar
–
15:00 GMT, 20 Mar 2024
1
Infosecurity Magazine Spring Online Summit 2024: Day Two
Online Summit
10:45
–
16:00 EDT, 20 Mar 2024
2
Russia’s Midnight Blizzard Accesses Microsoft Source Code
News
11 Mar 2024
3
I-Soon GitHub Leak: What Cyber Experts Learned About Chinese Cyber Espionage
News Feature
27 Feb 2024
4
LockBit Takedown: What You Need to Know about Operation Cronos
News
26 Feb 2024
5
Women in Cybersecurity at Infosecurity Europe 2024
Magazine Event
15:00
–
17:30 BST, 5 Jun 2024
6