JOBS > Training


« Back to News

2024-10-30

Making Insider Threats A Year Round Priority

The Danger Within: The biggest risk to an organization's cyber security comes from the inside - and that needs to be a top priority all year round.

2024-10-27

Teach Your Children About Safer Cyber Security

Internet safety and cyber security are vital parts of technology education. Adults need to ensure youngsters can navigate the digital world safely.

2024-10-17

Cybersecurity Education: Preparing the Next Generation of Cyber Defenders 

The online threat environment is worsening and stakeholders must partner and ensure more students enroll in cybersecurity courses.

2024-10-07

Higher Education In Artificial Intelligence & Quantum Computing

The Chartered Institute of Information Security is adding AI & Quantum Computing modules to its CyberEPO for all students.

2024-07-23

AI Is Predicted To Replace Eight Million British Jobs

Jobs Apocalypse: Women, young workers and low-paid individuals face the greatest threat from the AI-driven automation of many jobs.

2024-04-18

The Cyber Security Skills Gap Is A Chicken & Egg Problem

New Starter Jobs: Openings for experienced candidates outnumber those for entry level positions by a ratio of two to one. By Jamal Elmellas

2024-04-23

Focus On Education With CYRIN Cyber Range

CYRIN In The Classroom: A live training platform that replicates real software & networks. Learners learn by doing, not by watching others.

2024-04-10

Mitigating The Growing Insider Risk

User Activity Monitoring & Behavioral Analytics: Helping organizations meet the goal of being more informed and more secure. By Mike Crouse

2024-02-16

Building A Cyber-Savvy Nation In The Face Of A Talent Shortage

Building a culture of security means investing in your workforce. That's not a one-time expense, but an ongoing commitment. By Spencer Starkey

2024-01-29

Cyber Security Education From Childhood Is Becoming Vital

Over 70% of children around the world have experienced at least one type of cyber threat online. They need education to protect themselves.

2024-01-15

The Cybersecurity Skills Gap Is Not Just A Numbers Game

A mass recruitment drive is unlikely to provide an effective solution. Training and retaining skilled staff are the key issues. By Jamal Elmellas

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Libraesva

Libraesva

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.