Infosecurity Group Websites
Magazine
Events
Infosecurity Europe
Infosecurity Leadership Summit
Infosecurity Magazine Events
Infosecurity North America
Infosecurity Netherlands
Infosecurity Belgium
Infosecurity Russia
Infosecurity Mexico
Infosecurity Middle East
Insight
Infosecurity Webinars
Infosecurity Whitepapers
Infosecurity Online Summits
Latest
Nigerian Cybercrime Ring's Phishing Tactics Exposed
Human Error Fuels Industrial APT Attacks, Kaspersky Reports
DogeRAT Malware Impersonates BFSI, Entertainment, E-commerce Apps
Why the UK Government Must End its Senseless Encryption Demands
Ransomware Gangs Adopting Business-like Practices to Boost Profits
News
Topics
Features
Webinars
White Papers
Podcasts
Events & Conferences
Directory
Search
Infosecurity Magazine Home
»
Roger Thompson
Roger
Thompson
Related to Roger Thompson
12 Nov 2013
Webinar
Hitting the Reset Button: Developing a Proactive, End-to-End Security Strategy
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
1
25 May 2023
News
Advanced Phishing Attacks Surge 356% in 2022
2
24 May 2023
News
Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware
3
26 May 2023
News
New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
4
25 May 2023
News
NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure
5
7 Apr 2023
Blog
How to Fix SQL Server Recovery Pending Error
6
25 May 2023
News
Expo Framework API Flaw Reveals User Data in Online Services
1
24 May 2023
News
50% of UK CEOs See Cyber as a Bigger Business Risk than the Economy
2
19 May 2023
News
Experts Warn of Voice Cloning-as-a-Service
3
24 May 2023
News
Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware
4
26 May 2023
News
New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
5
24 May 2023
News
Backup Repositories Targeted in 93% of Ransomware Attacks
6
22 May 2023
News
Meta Fined €1.2bn for Violating GDPR
1
23 May 2023
Webinar
The Growing Importance of Digital Forensics and Incident Response in Corporate Environments
2
18 May 2023
Webinar
The ChatGPT Revolution: The Role of Large Language Models in Enterprise IT
3
11 May 2023
Webinar
How to Transfer Data Securely When Moving to the Cloud
4
3 May 2023
Webinar
Adapting Your Data Security Strategy to the Latest Cyber Threats
5
20 Apr 2023
Webinar
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
6
9 Mar 2023
Webinar
Authentication Security: Crafting a Bulletproof Password Reset Process
1
25 Apr 2023
News
#RSAC: Election Protection is CISA’s Top Priority for Next 18 Months
2
11 Apr 2023
News Feature
Replacing GDPR in the UK: Assessing AI and Research Provisions
3
24 Apr 2023
News
#RSAC: Understanding AI's Role in Cybersecurity Beyond the Hype
4
25 Apr 2023
News
Thousands of Social Media Takedowns Hit People Smugglers
5
25 Apr 2023
Opinion
Pulling Back the Curtain to Address TikTok Security Concerns
6
20 Apr 2023
Webinar
How to Mitigate Cyber-Risks Through a Threat Exposure Management Program
Please wait…