JOBS > Careers


« Back to News

2021-01-18

Five Reasons Why Women Should Consider A Career In Cyber Security

As most cybersecurity jobs remain unfilled, women have great potential in the industry and it might be the perfect career choice. By Shaheryar Sadiq

2020-11-23

The Skills Shortage Presents A Looming Cyber Security Threat

Help Wanted: The global IT security skills shortage now exceeds 4 million and the workforce needs to increase by 145% to fill the expected demand.

2020-10-29

Amazon Sacks Employee Over Data Violation

Employees of Amazon’s Smart Doorbell product department used their account permissions to access video surveillance data of some customers.

2020-10-28

Cyber Professionals Fear Being Replaced By AI

Survey: Young cyber security professionals are happy in their jobs, but much more concerned about the impact of AI than their older colleagues.

2020-10-14

New Skills For A Career In Cyber Security

As the number job vacancies grows, many technology-literate people are starting to think about a well paid new career in cyber security.

2020-10-06

Sentiment About Cyber Security Professionals Improves

Upwardly Mobile: Cyber Security professionals are no longer being viewed as roadblocks to business efficiency.

2020-09-10

Getting A Cyber Security Job

There is a huge skills gap in the cyber security job market. People going into cyber security will have interesting and well paid careers.

2020-08-04

The Cyber Security Threat From Employees

Human errors are the leading cause of data and security breaches as they are not predicable, whereas computers & technology are predictable.

2020-07-30

Women In Cyber Security Are Paid Much Less Than Men

There is still a shortage of women in the global cyber security workforce - not least because they are paid 21% less than men doing the same job.

2020-07-01

LinkedIn ‘Job Offers’ Targeted Aerospace & Military Personnel

A malware campaign used LinkedIn spear-phishing messages posing as recruiters to steal data from the military and aerospace executives.

2020-06-23

Some Employees Think They Can Dodge Cyber Security

The serious damage data breaches cause is encouraging businesses to re-examine their cybersecurity and to change employee behaviour.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Slovenian Digital Coalition

Slovenian Digital Coalition

Slovenian Digital Coalition is a coalition working in the field of smart cities, e-commerce, e-skills, e-inclusion, cyber security, internet and other areas related to developing the digital society.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.

Security Mind

Security Mind

Security Mind is an innovative Cyber Security Awareness program that aims to increase the awareness of each member of the organization and develop the ability to recognize potential cyber threats.