The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

FMI on Firewall
Demand for advanced security driving Firewall as a Serv...
Last week

Gartner on Microsoft Azure
Exclusive: Semperis continues to rise to the challenge
Last month

FMI on IT Automation
Cybersecurity in the robotics market grows in the billi...
Last month

Forrester Research on Breach Prevention
BlueVoyant's cybersecurity monitoring solution delivers...
Last month

Frost & Sullivan on Endpoint Protection
Frost & Sullivan names CrowdStrike top endpoint securit...
Tue, 25th Apr 2023
Reviews

Gaming
Invite-only panel reviews Australia's Security of Criti...
Tue, 29th Nov 2022

Norton
Hands-on review: Norton Identity Advisor Plus
Fri, 11th Nov 2022

Google
Hands-on review: Yubikey 5C NFC
Thu, 22nd Sep 2022

CrowdStrike
Hands-on intrusion attempts up 50% year-over-year - rep...
Wed, 14th Sep 2022
Expert columns

By Jack Misiura of The Missing Link
Input Validation and the problems with Sanitisation
2 days ago

By Andrew Kay of Illumio
What do you need to do to raise your cyber resilience?
3 days ago

By Shani Czyzyk of Radware
How threat intelligence can improve DDoS protection
Last week

By Bogdan Botezatu of Bitdefender
Take the Password Pledge and secure the digital you
Last week

By Jason Whyte of Trustwave
Five reasons why a career in cybersecurity is worth pur...
Last week
Interviews

Discussing NetApp
Exclusive: NetApp ready to defend with new ransomware g...
Last week

Discussing Network visibility
Exclusive: Nozomi Networks provides cyber visibility
Fri, 10th Mar 2023

Discussing CyberArk
Exclusive: CyberArk highlights the importance of identi...
Thu, 1st Dec 2022

Discussing Data Protection
Exclusive: Trustwave strengthens cybersecurity as threa...
Fri, 2nd Sep 2022

Discussing Contact Centre
How protected are migrants and refugees from cybercrime...
Wed, 31st Aug 2022
More expert columns

By Louis Tague of Mandiant
Staying ahead of the changing threat landscape in 2023
Last week

By Jennifer Cheng of Proofpoint
The APJ Threat Landscape -Why Employees Might Be Your B...
Last month

By Ilan Rubin of Wavelink
The need to create a strong cyber response framework
Last month

By Jen Locklear of ConnectWise
How To Overcome the IT Skills Gap With Upskilling
Last month

By Pieter Danhieux of Secure Code Warrior
Australia is turning a corner on security-by-design
Last month

By Clarence Dent of WalkMe
Protect Your Employees From Becoming A ‘Single Point of...
Last month
Top players
You can read more from the top players Fortinet, Kaspersky, Trend Micro, Palo Alto Networks, and Symantec.
Recent news

About BSA
Top tips to make businesses safer as cyber crime evolve...
Today

About CrowdStrike
CrowdStrike launches new generative AI security feature...
Today

About University of Sydney
NEC Australia, Western Sydney University team up for gr...
Today

About Identity Theft
Ping Identity launches new way to protect against ident...
Today

About Malware
Enterprises more prone to ransomware and malware: Netwr...
Today
More expert columns

By Clarence Dent of WalkMe
Protect Your Employees From Becoming A ‘Single Point of...
Last month

By Andrew Solovay of TechLoot
The high cost of the cybersecurity skills gap: Why we n...
Last month

By Rob Dooley of Rapid7
Building resilience in a persistently elevated threat c...
Last month

By Dan Daniels of Gigamon
What exactly is hybrid cloud – the advantages and disad...
Last month

By Thomas Naylor of The Missing Link
Four reasons to train your employees in cybersecurity i...
Last month

By Alice Kalambokas of Infosys Consulting
Managing cybersecurity risk in a transformational lands...
Last month
Video interviews

Discussing Passwords
Video: 10 Minute IT Jams - An update from Okta
Last week

Discussing Secureworks
Video: 10 Minute IT Jams - An update from Secureworks
Wed, 19th Apr 2023

Discussing Data breach
Video: 10 Minute IT Jams - An update from Varonis
Wed, 12th Apr 2023

Discussing Data Protection
Video: 10 Minute IT Jams - An update from Cequence Secu...
Fri, 24th Mar 2023

Discussing Tanium
Video: 10 Minute IT Jams - The latest from Tanium
Thu, 23rd Mar 2023
Even more expert columns

By Alice Kalambokas of Infosys Consulting
Managing cybersecurity risk in a transformational lands...
Last month

By Ted Garner of Konica Minolta
The often-overlooked cybersecurity risk: unsecured prin...
Last month

By Rajeevan Kanagasabai of Ribbon Communications ANZ
Helping to win the battle to curb SMS and voice fraud
Last month

By Ilan Rubin of Wavelink
Why securing digital assets is critical for businesses
Fri, 28th Apr 2023

By Tim Wallen of Logpoint
Why SAP systems are a worrying security blind spot
Fri, 21st Apr 2023

By Mark Lukie of Barracuda APAC
You’ve dealt with the ransomware, how come it’s back?
Thu, 20th Apr 2023

By Amir Jerbi of Aqua Security
The truth revealed - agentless security is not real sec...
Wed, 19th Apr 2023

By Rob Dooley of Rapid7
What am I walking into? How to prepare for your first C...
Wed, 19th Apr 2023

By Matias Madou of Secure Code Warrior
Why achieving API best practice requires a security ret...
Thu, 13th Apr 2023

By Ragnar Rattas of CybExer Technologies
The top things to consider when investing in a cyber ra...
Wed, 5th Apr 2023
More news

About New Zealand
Cyber Sentience exposes hackers selling school IT Syste...
Yesterday

About IT Training
SG students undergo AI cybersecurity education and trai...
2 days ago

About Malware
AceCrypto crimeware hits computers 10,000 times a month
3 days ago

About Data breach
Over 340 million accounts compromised in data breaches
3 days ago

About Economy
Holistic API security needed in face of increasing cybe...
3 days ago
Even more news

About Palo Alto Networks
Palo Alto Networks, Ingram Micro to provide cybersecuri...
3 days ago

About Catalyst
Cohesity expands its partnership with data security all...
Last week

About Software-as-a-Service
OpenText is an application security testing leader: Gar...
Last week

About CyberArk
CyberArk introduces first identity security-based enter...
Last week

About Distributed Denial of Service
Türk Telekom delivers DDoS protection services with A10...
Last week
Other guides
You can read other related guides from Breach Prevention, Network Management, Artificial Intelligence, Network Security, and Firewall.
Powered by