<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/webinar/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #Webinar</title><description>Lifu Technologies - Blog #Webinar</description><link>https://www.lifutechnologies.co.za/blogs/tag/webinar</link><lastBuildDate>Thu, 16 Apr 2026 13:32:01 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Mitigating Cyber Risk in an Increasingly Digital Economy e.g. AI powered phishing sites]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Mitigating-Cyber-Risk-in-an-Increasingly-Digital-Economy-e.g.-AI-powered-phishing-sites</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/files/Lifu Branded Materials/BV_LI_Event-Banner_Lifu_060923_02.png"/>How can security teams fight back and protect their companies’ customers from falling victim to phishing attacks?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_IsE0eqBGTGGjnXWckYWofg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HqHWytaPT8Wmlh6U7oEFTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_sNdTgUL8Sn295MI_UJqdEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_sNdTgUL8Sn295MI_UJqdEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1EfATcHzYHcFLczot_E8LA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1EfATcHzYHcFLczot_E8LA"] .zpimage-container figure img { width: 1070px ; height: 559.08px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_1EfATcHzYHcFLczot_E8LA"] .zpimage-container figure img { width:723px ; height:377.77px ; } } @media (max-width: 767px) { [data-element-id="elm_1EfATcHzYHcFLczot_E8LA"] .zpimage-container figure img { width:415px ; height:216.84px ; } } [data-element-id="elm_1EfATcHzYHcFLczot_E8LA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Lifu%20Branded%20Materials/BV_Event-OG_Lifu_060923_02.png" width="415" height="216.84" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_h9OkvB5jRk2WA0twHF9ojw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h9OkvB5jRk2WA0twHF9ojw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Hackers use brand imagery, assets, and messaging to create spoofed websites, social media accounts, and apps. The goal is to trick users into providing their personally identifiable information (PII) or payment card data. How can security teams fight back and protect their companies’ customers from falling victim to phishing attacks?</span></p></div>
</div><div data-element-id="elm_hINhPxzKRVes7Wv9168Psw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_hINhPxzKRVes7Wv9168Psw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://meeting.lifutechnologies.co.za/meeting/register?sessionId=1017363826&amp;src=d39e96811a5f230e9e9044212020ece71015d8de4d104e6c471d8aa0f1fb457b"><span class="zpbutton-content">Register now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 13 Jun 2023 12:19:49 +0200</pubDate></item><item><title><![CDATA[Mitigating Cyber Risk in an Increasingly Digital Economy]]></title><link>https://www.lifutechnologies.co.za/blogs/post/mitigating-cyber-risk-in-an-increasingly-digital-economy</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Webinar 190423 event banner.png"/>Join us on April 19 for a live webinar as we discuss common cyber attacks used by today’s threat actors and how to defend your digital brand from fina ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_fIqn9-wsQ6C4LZPiMLPr6g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_AzrxGwvpRq6DRx8nHCu9Mw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gQPm0K5DTMmitUfXuTaVGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_s4aZkaEpSlWGBTk0svFFHA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_s4aZkaEpSlWGBTk0svFFHA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div><p><span style="font-size:29pt;font-weight:300;">How can security teams fight back and protect their companies’ customers from falling victim to phishing attacks? </span></p></div>
</div></div></div></div></h2></div><div data-element-id="elm_NREMOHuMQ4KjmgzshMf2Gg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NREMOHuMQ4KjmgzshMf2Gg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:14px;font-weight:normal;text-indent:0px;">Join us on April 19 for a live webinar as we discuss common cyber attacks used by today’s threat actors and how to defend your digital brand from financial and reputational damages. Register here:&nbsp;</span><a href="https://www.bluevoyant.com/resources/mitigating-cyber-risk-cee" target="_blank">https://www.bluevoyant.com/resources/mitigating-cyber-risk-cee</a></span></p></div>
</div><div data-element-id="elm_7ILv1oEDR06_PCAdPv6jqg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_7ILv1oEDR06_PCAdPv6jqg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/BlueVoyant_Invitation_Mitigating%20Cyber%20Risk%20in%20an%20Increasingly%20Digital%20Economy.pdf" download><span class="zpbutton-content">Download Flyer</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 01 Apr 2023 11:20:12 +0200</pubDate></item></channel></rss>