VerifiedComputer and Network Security

Cyber Security

We love solving problems, building better processes, and keeping things up and running. From crisis control to proactive planning, we provide expert guidance for your toughest cybersecurity challenges. Incident Response Training It's no secret that cybersecurity incidents are on the rise and with the increasing sophistication of attacks, it's only a matter of time before every organisation is targeted. Social Engineering Social engineering is the art of manipulating end users so they give up confidential information or credentials. Vulnerability Scanning Vulnerability scanning is an important part of any security program. Advanced Threat Hunting Threat hunting is an important part of an organisation’s cybersecurity strategy. APIs When it comes to keeping your software and applications secure, API penetration testing is an absolutely essential part of the equation. Mobile Applications As mobile devices become increasingly popular, so too does the need for mobile application security. Privacy: HIPAA, GDPR, CCPA When it comes to privacy, there are a lot of different acronyms and regulations to keep track of. User Awareness Training Security Awareness Training helps transform employees from being seen as cyber risks to organisations into a strong line of defense. Cloud Security Redundant, off-site backup is key for a successful disaster recovery plan and archival retention. We can help protect your organisation if disaster were to strike. Infrastructure Simulating real-world attacks, pen testing can help to identify vulnerabilities in a system before they can be exploited. Cyber Risk Assessments A comprehensive cyber risk assessment is essential to protect your business from cyber-crime. We believe that everyone has the right to cybersecurity, privacy and a thriving future. Let’s talk.

7-day free trial · no credit card

HeadquartersLondon, United KingdomEmployees1.2K(11 to 50)Websitecodebees.netLinkedIn profileLinkedIn

Verified contacts

200

available on Kipplo

LinkedIn employees

1.2K

11 to 50 range

Open roles

no listings

Distinct roles

556

indexed titles

Tech stack

2

tools in use

Monthly traffic

organic / mo

Sign up free to see all 200 verified contacts at Cyber Security

Free for 7 days · 50 credits · no card · only pay for verified records.

Sign up free

Decision-makers and verified team members

200 contacts with verified email or phone · masked until revealed.

Sign up free →

Top roles at Cyber Security

556 distinct titles indexed · top 10 shown.

  • 11classified manager
  • 11engineer
  • 9manager
  • 6ceo
  • 6software engineer
  • 5analyst
  • 5cyber security analyst
  • 5director
  • 5investigator
  • 5worker
  • +546more titles

Sign up to unlock all 200 contacts at Cyber Security

Free for 7 days · 50 credits · no card · only pay for verified records.

Sign up free

Sign up to reveal 200 verified contacts at Cyber Security

7-day trial · no credit card · cancel anytime · only pay for verified records.

Trusted by sales, marketing, and GTM engineering teams.

Cyber Security | Kipplo Discover