JOBS > Training


« Back to News

2024-12-20

Cybersecurity Challenges In Managing Learning Centres

Rising Threats: Understanding cyber threats to education centers and how you can leverage secure management systems to counter them.

2024-12-16

Over Confidence In Cyber Security Training Reduces Security

Research among financial services workers shows a disconnect between employers' confidence in cyber security policies & their staff's understanding. 

2024-12-16

Turning The Weakest Link Into Cybersecurity’s Strongest Line Of Defence 

Organisations can significantly reduce the risk of breaches by creating an informed workforce that understands cybersecurity threats. By Qasim Bhatti

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-10-31

Preparing IT Teams For The Next AI Wave

The growing importance of AI has created a compelling reason for IT departments to address risk and compliance with renewed urgency.

2024-11-01

Cyber Security Teams Feel The Pressure 

Understaffed, Overworked & Underfunded: Cyber security teams are also suffering from major skills gaps and a shortage of well- trained people.

2024-10-30

Making Insider Threats A Year Round Priority

The Danger Within: The biggest risk to an organization's cyber security comes from the inside - and that needs to be a top priority all year round.

2024-10-27

Teach Your Children About Safer Cyber Security

Internet safety and cyber security are vital parts of technology education. Adults need to ensure youngsters can navigate the digital world safely.

2024-10-17

Cybersecurity Education: Preparing the Next Generation of Cyber Defenders 

The online threat environment is worsening and stakeholders must partner and ensure more students enroll in cybersecurity courses.

2024-10-07

Higher Education In Artificial Intelligence & Quantum Computing

The Chartered Institute of Information Security is adding AI & Quantum Computing modules to its CyberEPO for all students.

2024-07-23

AI Is Predicted To Replace Eight Million British Jobs

Jobs Apocalypse: Women, young workers and low-paid individuals face the greatest threat from the AI-driven automation of many jobs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.