Providing affordable, around-the-clock cyber security for your business

Cyber Research is a full-service cyber security company in Australia and New Zealand. We help customers to identify, control and respond to cyber threats. We provide 24/7 security operations centres, security strategy and assessments,  penetration testing and expert consulting services. We are your frontline partner in cyber protection.

ABOUT US

We’ve been helping business and government manage information security risks since 2007.

WHAT WE DO

We assess, test and help
secure organisations.

EXPERTISE

Whatever the risk faced, Cyber Research has the expertise to help you achieve resilience.

Cyber cloud security

Security Assessment

Measuring your organisation’s capability and resilience to cyber attack

~

Penetration Testing

Finding the hidden security gaps that let attackers in to your systems and applications, and closing them.

Security Operations Centres

Fully outsourced security services providing 24 x 7 cyber security for your operations.

Red Teams

The most realistic way to assess your security capability and find gaps, putting people, proceses and technology to the test.

Cyber Strategy

Creating your organisation’s long term response to cyber risk

Cyber Education

Training your staff to be vigilent against attack, working with Boards to help them define cyber risk.

What our customers are saying about us

“Cyber Research has the best quality security testing and capability I’ve seen – their expertise and results beat the ‘big four’ hands down. Cyber Research are our long-term security partner.”

CIO, Government

“Very impressive – they quickly exposed the holes other security companies we’d used before didn’t find.”

CIO, Global Telco

“They made us think about security in a way we’d never thought and they found gaping issues in our company’s systems that we didn’t know were there. We are much better protected now”.

CFO, ASX Top 50 Company

Subscribe to download our service data sheets

  • This field is for validation purposes and should be left unchanged.

Cyber Pirates are on the Horizon – Only a Proactive Security Strategy Blows Them out of the Water

Somali Pirates hijacking container ships for ransom on the high seas were a massive threat barely half a decade ago. It was so shocking that three or four people in wooden boats with AK47s could overrun giant container ships they even made a movie about it starring...
Read More

Staying in Control During a Cyber Crisis – Why Forensic Thinking and Clear Communication Matters

Increasingly cyber incidents warrant the need to declare a major corporate crisis which plays out in public. Data breach, cyber attack, ransomware attack or even during fast moving corporate frauds (such as data destruction or IP theft) are examples. This week's Petya...
Read More

Australia’s Data Breach Notification Law – The Basics You Need To Know

Historically there has been little motivation for Australian organisations to publicly disclose security incidents where sensitive personal and private data has been lost or stolen. But that changes in February 2018 when Australia’s new Data Notification Law (‘DNL’)...
Read More