The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

Canalys on AWS
CrowdStrike receives multiple honours at 2023 AWS Partn...
Last week

Frost & Sullivan on Apps
Absolute Software unveils Application Health for enhanc...
Last month

Forrester Research on PAM
Forrester names CyberArk a privileged identity manageme...
Fri, 13th Oct 2023

Canalys on Managed Services
Business reliance on IT managed services increases in 2...
Thu, 28th Sep 2023

Forrester Research on IT Infrastructure
Check Point a leader in zero trust platform providers: ...
Fri, 22nd Sep 2023
Featured news

About Barracuda
Bad bots make up 30% of internet traffic and they’re af...
Last month

About Ebooks
Cybersecurity: The big lessons from APRA’s stocktake
Mon, 9th Oct 2023

About Barracuda
How OT/IT security gaps threaten industrial transformat...
Mon, 2nd Oct 2023

About IT Training
The rise of CISO stress: Recognising and reconciling th...
Fri, 22nd Sep 2023

About Canon
How do the Zero Trust principles apply to printing?
Tue, 19th Sep 2023
Expert columns

By Scott Hesford of BeyondTrust
Aussie firms must contextualize rising cyber incident d...
Today

By Nam Lam of SailPoint
The shifting security perimeter in higher education
Yesterday

By Ashley Diffey of Ping Identity
The surprising reason customers are abandoning digital ...
Yesterday

By Katrina Lawrence of Dell Technologies
Education has gone digital: here’s how to drive student...
Yesterday

By Fleming Shi of Barracuda
The risks and rewards of AI: A Year After ChatGPT's Ris...
2 days ago
Interviews

Discussing Gartner
Exclusive: Synopsys and the evolution of robust securit...
Last month

Discussing Machine learning
Exclusive: Mitigating non-employee risks with SailPoint...
Tue, 17th Oct 2023

Discussing Browsers
Exclusive: Menlo Security continues to lead in browser ...
Fri, 25th Aug 2023

Discussing Machine learning
Exclusive: RUCKUS Network's NaaS program leads the way
Wed, 5th Jul 2023

Discussing Communications
Exclusive: Persistent protection with StarHub's Managed...
Fri, 30th Jun 2023
More expert columns
.webp)
By Dr. Jessie Jamieson of Tenable
Australia's six cyber shields: Will data science be sev...
2 days ago

By Jason Whyte of Trustwave
Why you should create a physical security standard for ...
2 days ago

By Lloyd Thomas of Jamf
ArtificiaI Intelligence and Cybersecurity: The Bad and ...
Last week

By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Last week

By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Last week

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Last week
Top players
You can read more from the top players Fortinet, Gartner, Kaspersky, Trend Micro, and Check Point Software.
Recent news

About Vodafone
CBA & Vodafone collaborate to fight rising SMS scams in...
Today

About Japan
OpenSSF announces new members & secure software develop...
Yesterday

About Gartner
87% increase in cybersecurity investment by ANZ CIOs sa...
Yesterday

About Intel
Siemens & Intel to boost sustainability in semiconducto...
Yesterday

About Innovation
Infinigate appoints Caroline Hutchins as new Chief Peop...
Yesterday
More expert columns

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Last week

By Vivek Ramachandran of SquareX
The quest for email privacy in a world full of trackers
Last week
.webp)
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Last month

By Leon Poggioli of Claroty
Cybersecurity can be a source of competitive advantage ...
Last month

By Chris Johnson of Nokia
Why enterprises and governments should prepare for Q-Da...
Last month

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last month
Video interviews

Discussing Mobile threats
Video: 10 Minute IT Jams - An update from Appdome with ...
Mon, 16th Oct 2023

Discussing Acronis
Video: 10 Minute IT Jams - An update from Acronis with ...
Thu, 12th Oct 2023

Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Wed, 4th Oct 2023

Discussing Commvault
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023

Discussing Ricoh
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last month

By Mark Gorrie of Gen
Why Whac-A-Mole is not a strategy for defending against...
Last month

By Jonathan Hatchuel of Gigamon
Why East-West traffic security is so important
Last month

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Last month

By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Last month

By Johan Gerber of Mastercard
In today’s data-driven world, compromising on cybersecu...
Last month

By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
Last month

By Garett Paton of Dell Technologies
GenAI is transformative, but there are also security ri...
Tue, 31st Oct 2023

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023

By Jennifer Cheng of Proofpoint
Female representation in cybersecurity leadership roles...
Mon, 30th Oct 2023
More news

About Imperva
Thales completes USD $3.6 billion acquisition of cybers...
Yesterday

About BT
BT partners with Digital Realty to expand Global Fabric...
Yesterday

About Adobe
Surge in malicious emails using Adobe InDesign, warns c...
2 days ago

About Europol
Utimaco launches u.trust LAN Crypt Cloud to boost data ...
2 days ago

About Hacktivists
Orange Cyberdefense reveals worrying rise in cyber inci...
2 days ago
Even more news

About Malware
Pentest People launches cybersecurity training course
2 days ago

About Managed Services
Exclusive: Why WithSecure continues to expand and evolv...
Last week

About Hackers
DerScanner introduces Supply Chain Security to protect ...
Last week

About Versent
Australian tech sector struggles with balancing data se...
Last week

About Software
Military cyber security market to reach $7.2 billion by...
Last week
Other guides
You can read other related guides from Breach Prevention, Artificial Intelligence, Network Management, Network Security, and Firewall.
Powered by