The Missing Link stories
Mimecast’s top A/NZ channel partners of 2019
The company has announced the winners of its Mimecast Partner Awards which celebrate channel partner performance across eight categories.
Sophos celebrates top performing A/NZ partners
The award winners were announced at the A/NZ leg of its partner conference, Sophos Discover, in Sydney on Friday.
French cyber startup Alsid reaches out to Asia Pacific
French cybersecurity startup Alsid is setting its sights on the vast market opportunities in Asia, and Hong Kong is its initial base of choice – because it’s an attractive target for cyber attacks.
Nozomi Networks and The Missing Link team up to deliver industrial cybersecurity solution
Threat actors are increasingly targeting industrial control systems (ICS) in manufacturing and critical infrastructure.
The Missing Link to resell industrial cybersecurity solutions across A/NZ
Australian IT firm The Missing Link is now the preferred reseller for Nozomi Network’s industrial cybersecurity solutions across Australia and New Zealand.
ThreatQuotient and The Missing Link partner to strengthen threat operations in Australia
The alliance will empower organisations with a platform purpose-built to accelerate security operations.
ACSC's chief welcomes Sydney's newest Security Operations Centre
Sydney’s North Shore is now home to one of the country’s newest Security Operations Centres (SOCs), which opened in Artarmon this morning.
Photo Gallery: Mimecast celebrates Australian partners
Dimension Data, Brennan IT, Datacom and The Missing Link were among the winners at Mimecast’s Channel Connect gala awards dinner in Sydney last week.
The Missing Link takes on Melbourne with new expansion
Sydney-based The Missing Link has spread its wings, expanding into Melbourne as it sees rapid growth and high demand from clients in the region.
Businesses in A/NZ must work with digital disruption for success, exec says
“New tools, new processes, and new duties for IT will define this revolution and shape businesses for the future.”
Identity theft - have you ever pen tested procedures?
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.