The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

Canalys on AWS
CrowdStrike receives multiple honours at 2023 AWS Partn...
Last month

Frost & Sullivan on Apps
Absolute Software unveils Application Health for enhanc...
Last month

Forrester Research on PAM
Forrester names CyberArk a privileged identity manageme...
Fri, 13th Oct 2023

Canalys on Managed Services
Business reliance on IT managed services increases in 2...
Thu, 28th Sep 2023

Forrester Research on IT Infrastructure
Check Point a leader in zero trust platform providers: ...
Fri, 22nd Sep 2023
Featured news

About Barracuda
Bad bots make up 30% of internet traffic and they’re af...
Last month

About Ebooks
Cybersecurity: The big lessons from APRA’s stocktake
Mon, 9th Oct 2023

About Barracuda
How OT/IT security gaps threaten industrial transformat...
Mon, 2nd Oct 2023

About IT Training
The rise of CISO stress: Recognising and reconciling th...
Fri, 22nd Sep 2023

About Canon
How do the Zero Trust principles apply to printing?
Tue, 19th Sep 2023
Expert columns

By Scott Hesford of BeyondTrust
Aussie firms must contextualize rising cyber incident d...
Last week

By Nam Lam of SailPoint
The shifting security perimeter in higher education
Last week

By Ashley Diffey of Ping Identity
The surprising reason customers are abandoning digital ...
Last week

By Katrina Lawrence of Dell Technologies
Education has gone digital: here’s how to drive student...
Last week

By Fleming Shi of Barracuda
The risks and rewards of AI: A Year After ChatGPT's Ris...
Last week
Interviews

Discussing Gartner
Exclusive: Synopsys and the evolution of robust securit...
Last month

Discussing Machine learning
Exclusive: Mitigating non-employee risks with SailPoint...
Tue, 17th Oct 2023

Discussing Browsers
Exclusive: Menlo Security continues to lead in browser ...
Fri, 25th Aug 2023

Discussing Machine learning
Exclusive: RUCKUS Network's NaaS program leads the way
Wed, 5th Jul 2023

Discussing Communications
Exclusive: Persistent protection with StarHub's Managed...
Fri, 30th Jun 2023
More expert columns
.webp)
By Dr. Jessie Jamieson of Tenable
Australia's six cyber shields: Will data science be sev...
Last week

By Jason Whyte of Trustwave
Why you should create a physical security standard for ...
Last week

By Lloyd Thomas of Jamf
ArtificiaI Intelligence and Cybersecurity: The Bad and ...
This month

By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Last month

By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Last month

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Last month
Top players
You can read more from the top players Fortinet, Gartner, Kaspersky, Trend Micro, and Check Point Software.
Recent news

About Predictions
Gallagher Security predicts innovative shift in 2024 se...
Last week

About Tech Data
Tech Data uncovers trends in APJ technology sector with...
Last week

About Cyber Risk
Australian supply chain cyber breaches surge by 17% say...
Last week

About Gen
AI to customise cyber threats, predicts cybersecurity f...
Last week

About Cisco
Cisco reaches goal of impacting one billion lives early
Last week
More expert columns

By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Last month

By Vivek Ramachandran of SquareX
The quest for email privacy in a world full of trackers
Last month
.webp)
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Last month

By Leon Poggioli of Claroty
Cybersecurity can be a source of competitive advantage ...
Last month

By Chris Johnson of Nokia
Why enterprises and governments should prepare for Q-Da...
Last month

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last month
Video interviews

Discussing Mobile threats
Video: 10 Minute IT Jams - An update from Appdome with ...
Mon, 16th Oct 2023

Discussing Acronis
Video: 10 Minute IT Jams - An update from Acronis with ...
Thu, 12th Oct 2023

Discussing Passwords
Video: 10 Minute IT Jams - An update from LastPass with...
Wed, 4th Oct 2023

Discussing Commvault
Video: 10 Minute IT Jams - An update from Commvault
Tue, 26th Sep 2023

Discussing Ricoh
Video: 10 Minute IT Jams - An update from Ricoh Austral...
Tue, 5th Sep 2023
Even more expert columns

By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Last month

By Mark Gorrie of Gen
Why Whac-A-Mole is not a strategy for defending against...
Last month

By Jonathan Hatchuel of Gigamon
Why East-West traffic security is so important
Last month

By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Last month

By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Last month

By Johan Gerber of Mastercard
In today’s data-driven world, compromising on cybersecu...
Last month

By Bryan Saba of Excite Cyber
Cybersecurity is full of fear –we need to change this
Last month

By Garett Paton of Dell Technologies
GenAI is transformative, but there are also security ri...
Tue, 31st Oct 2023

By Uri Dorot of Radware
Generative AI: A disruptive force at the hands of cyber...
Tue, 31st Oct 2023

By Jennifer Cheng of Proofpoint
Female representation in cybersecurity leadership roles...
Mon, 30th Oct 2023
More news

About IAB
Group-IB uncovers new Linux RAT targeting Thai company ...
Last week

About WatchGuard Technologies
Rising ransomware attacks exploit remote access softwar...
Last week

About Workplace culture
CybeReady enhances cybersecurity training with advanced...
Last week

About Innovation
RiverSafe partners with EARTH 51 to pioneer sustainable...
Last week

About Imperva
Imperva forecasts 2024 cybersecurity challenges and evo...
Last week
Even more news

About Communications
New Forescout report uncovers 21 new tech vulnerabiliti...
Last week

About Microsoft
DQA & DickersonDigital join forces, bolstering Australi...
Last week

About Cyber Threats
Fortune 500 firm wins International Cyber League Financ...
Last week

About NCSC
NCSC launches Cyber Incident Exercising scheme in the U...
Last week

About Trustwave
Trustwave reveals cybersecurity risks in manufacturing ...
Last week
Other guides
You can read other related guides from Breach Prevention, Artificial Intelligence, Network Management, Network Security, and Firewall.
Powered by