JOBS > Training


« Back to News

2025-05-02

Five Key Lessons For Building A Resilient Cyber Security Department

Building A Team: In times of crisis, UK businesses should prioritise the onboarding & training of cybersecurity professionals. By Kevin Vashi

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-04-04

Staying Secure, Skilled & Sustainable

The IT Balancing Act: Three key areas are shaping the IT industry - Cybersecurity, AI & Cloud adoption, and Sustainability. By Martin Hodgson

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

2025-02-25

The Evolution Of Cybersecurity Education: Bridging The Skills Gap In A Digital Era

Sophisticated Cyber Threats: Modern education is adapting to meet these challenges and what it means for the future of cybersecurity.

2025-02-14

Navigating The Latest Paths In Cybersecurity Certification

Organisations are looking for people with specialized cyber skills, and one of the best ways to validate your expertise is reputable certification.

2025-02-03

CISOs Increase Crisis Simulation Budgets

CISOs have growing concerns around rising attack volumes, lack of incident response planning and inadequate stress-testing of crisis scenarios.

2025-01-29

CYRIN's New Attack Scenario - On An HVAC Scada System

Find & Kill Hidden Malware: Every unsecured IoT device, every connected endpoint has become a potential target for cyber attacks.

2024-12-20

Cybersecurity Challenges In Managing Learning Centres

Rising Threats: Understanding cyber threats to education centers and how you can leverage secure management systems to counter them.

2024-12-16

Over Confidence In Cyber Security Training Reduces Security

Research among financial services workers shows a disconnect between employers' confidence in cyber security policies & their staff's understanding. 

2024-12-16

Turning The Weakest Link Into Cybersecurity’s Strongest Line Of Defence 

Organisations can significantly reduce the risk of breaches by creating an informed workforce that understands cybersecurity threats. By Qasim Bhatti

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.