JOBS > Training


« Back to News

2024-01-03

Bridging The Cybersecurity Skills Gap With Efficiency

How Cloud SIEM Platforms Can Maximize SOC Scalability: Innovative cloud-based solutions can help navigate the skills shortage. By Kev Eley

2023-12-11

Too Many Corporate Employees Ignore Cyber Security

Both Accidental & Intentional Behavior: Employees are the lifeblood of any organization - they also pose the greatest cyber security risk. 

2023-11-14

The Cyber Skills Gap Is Still Not Getting Better

Despite growing to 5.5 million professionals worldwide, the industry still needs millions of qualified workers to defend against digital threats.

2023-09-01

Empower Your DaaS Programs

Classroom Security: Managed cybersecurity service features like Device-as-a-Service can provide a competitive edge for schools. By Nadav Avni

2023-07-31

British University Data Breaches Are A Lesson For All

The potential reach and impact of a breach is serious, placing personal information at risk and disrupting millions of UK students. By Stuart Jubb

2023-06-28

Phishing – It’s Not About Malware (Or Even Email)

Phishing Is No Longer About Infecting Your Computer: Experts at SANS have analysed the latest trends and key indicators. By Lance Spitzner

2023-06-26

Employees To Blame For 70% Of Corporate Data Breaches

The Remote Work Time Bomb: Organisations must rebuild a culture that ensures everyone has a security-first mindset, wherever they’re working.

2023-06-29

British Universities Vulnerable To Credentials Fraud

Two Million Breached Credentials: British universities are at high risk of cyber security breaches caused by attacks launched using stolen identities.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

2023-05-31

Can Automation Help Bridge The Cyber Skills Gap?

Finding key cybersecurity staff is increasingly difficult - UEBA, Threat Intelligence Automation & SOAR can offer solutions. By Tim Wallen

2023-06-05

Cybersecurity & The Military

How to Find and Keep the Right People: The US military delivers excellent professional training and faces a struggle to retain its cyber talent.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.