The Ultimate Guide to Cybersecurity
2023 edition
Overview
Protecting the vast complexity of computer systems, networks, devices, and data depended upon by modern society is where cybersecurity comes into play.
This broad category of products, services, technologies, practices, processes and procedures, strategies, devices concerns itself with preventing unauthorised or criminal use of information technology assets of all kinds. As multifaceted as information technology itself is, so too is the cybersecurity subset of the industry broken down into multiple areas of specialization.
Major cybersecurity types include critical infrastructure security, application security, network security, cloud security, and device security.
Analyst reports

ADAPT on CFO
Cyber funding set to surge in light of high-profile bre...
3 days ago

on
Healthcare cyber vulnerability worry Kiwis: Palo Alto
Last week

Forrester Research on ExtraHop
87% reduction in time to resolve threats with ExtraHop
Last week

Gartner on CISOs
Zero trust strategies top of mind to reduce risk - Gart...
Last week

Gartner on Australian
Three ways to fortify your security strategy in 2023
Last month
Reviews

Gaming
Invite-only panel reviews Australia's Security of Criti...
Tue, 29th Nov 2022

Norton
Hands-on review: Norton Identity Advisor Plus
Fri, 11th Nov 2022

Google
Hands-on review: Yubikey 5C NFC
Thu, 22nd Sep 2022

CrowdStrike
Hands-on intrusion attempts up 50% year-over-year - rep...
Wed, 14th Sep 2022

World Password Day
Anniversaries remind us to review identity risks
Thu, 12th May 2022
Expert columns

By Rob Dooley of Rapid7
Will 2023 be a pivot year for cybersecurity?
Yesterday

By Ashish Kumar of Solo.io
Service meshes are an emerging way for application team...
Yesterday

By Mark Lukie of Barracuda
Why cloud-based resources still need effective backup
4 days ago

By Ben King of Okta
Okta's Identity and Trust Predictions for 2023
4 days ago

By Shane Buckley of Gigamon
Why deep observability is key to closing cloud migratio...
4 days ago
Interviews

Discussing CyberArk
Exclusive: CyberArk highlights the importance of identi...
Thu, 1st Dec 2022

Discussing Data Protection
Exclusive: Trustwave strengthens cybersecurity as threa...
Fri, 2nd Sep 2022

Discussing Contact Centre
How protected are migrants and refugees from cybercrime...
Wed, 31st Aug 2022

Discussing Malware
Exclusive: Bitdefender on ensuring cyber safety in toda...
Tue, 30th Aug 2022

Discussing Privacy
Aotearoa's new Privacy Commissioner shares focus moving...
Mon, 29th Aug 2022
More expert columns

By Ilan Rubin of Wavelink
Why you need to make cybersecurity an urgent priority
4 days ago

By Sean Deuby & Simon Hodgkinson of Semperis
Operational resilience: More than disaster recovery
Last week

By Vivian Dufour of Meterian
Want Cyber Insurance? Better get patching!
Last week

By Satya Gupta of Virsec
A solution to the security challenge of legacy applicat...
Last week

By Saara Hasu-Varttila of M-Files
How to secure your customers’ personally identifiable i...
Last month

By Contributor
The top video surveillance trend predictions for 2023
Last month
Top players
You can read more from the top players Fortinet, Kaspersky, Trend Micro, Symantec, and Palo Alto Networks.
Recent news

About Progress
Progress named leader for network detection and respons...
Yesterday

About Macquarie Telecom
Australian Tax Office renews security deal with Macquar...
3 days ago

About Mobile operators
Mobile operators urged to be more vigilant against cybe...
3 days ago

About Hardware
Yubico extends subscription programme, raises prices
3 days ago

About Gurucul
Half of organisations have experienced an insider threa...
Last week
More expert columns

By Contributor
The top video surveillance trend predictions for 2023
Last month

By Michael Bennett of SYSPRO
How ERP stakeholders can bridge the skills gap in the c...
Last month

By Jamie Atherton of Hyland
Automated information governance. Driving value, securi...
Thu, 22nd Dec 2022

By Joseph Carson of Delinea
Digital DNA theft could be coming in 2023
Wed, 14th Dec 2022

By Ricky Blacker of WP Engine & WordPress
Why building a secure browsing experience is vital
Mon, 12th Dec 2022

By Thomas Fikentscher of CyberArk
2023 Cybersecurity predictions from CyberArk
Thu, 8th Dec 2022
Video interviews

Discussing Data breach
Video: 10 Minute IT Jams - An update from Exabeam
Fri, 18th Nov 2022

Discussing Trustwave
Video: 10 Minute IT Jams - Introducing Trustwave
Tue, 15th Nov 2022

Discussing Fortinet
Video: 10 Minute IT Jams - An update from Fortinet
Fri, 14th Oct 2022

Discussing Web Development
Video: 10 Minute IT Jams - An update from SearchInform
Fri, 23rd Sep 2022

Discussing Hybrid
Video: 10 Minute IT Jams - An update from Puppet
Thu, 28th Jul 2022
Even more expert columns

By Thomas Fikentscher of CyberArk
2023 Cybersecurity predictions from CyberArk
Thu, 8th Dec 2022

By Neil Curtis of DXC Technology
The solution to the cyber security shortage is in our o...
Tue, 29th Nov 2022

By IIan Rubin of Wavelink
Cloud-only ZTNA is no longer enough to secure organisat...
Tue, 29th Nov 2022

By Jeremy Daly of DDLS
The key things needed to narrow the cybersecurity skill...
Thu, 17th Nov 2022

By Manu Mehra of Lenovo ISG
Insurance for extra baggage has never been more vital
Thu, 17th Nov 2022

By Ken Mizota of Rapid7
Building a targeted operating cybersecurity model
Wed, 16th Nov 2022

By Mark Gorrie of Gen Digital
Twelve social media threats to watch for in 2023
Mon, 14th Nov 2022

By Aliz Hammond of watchTowr
Text4Shell++ - Where there’s smoke, there’s fire
Mon, 14th Nov 2022

By Alex Lei of Proofpoint
Insider threats cannot be eliminated but zero-trust can...
Thu, 10th Nov 2022

By Tom Ascroft of Unit4
How leaders can safeguard customer data against today's...
Wed, 9th Nov 2022
More news

About Distributed Denial of Service
DDoS attack volumes up dramatically in last 20 years - ...
Last week

About Apple
71,000 customers served by Jamf in managing Apple devic...
Last week

About Nozomi Networks
Nozomi delivers industry’s 1st IoT endpoint security se...
Last week

About LogRhythm
LogRhythm expand security operations with enhanced anal...
Last week

About Security Operations Centre
Preparing your IT security defences for the year ahead
Last week
Even more news

About Developers
IT professionals concerned over the security of Kuberne...
Last week

About Amazon Web Services
AWS launches 2nd infrastructure Region for securing dat...
Last week

About KnowBe4
Gone phishing: Business emails remain top threat strate...
Last week

About Software-as-a-Service
Sentinels fights financial crime with new transaction m...
Last week

About Bitdefender
Spammers phishing tourists with travel-themed lures - B...
Last month
Other guides
You can read other related guides from Breach Prevention, Network Management, Artificial Intelligence, Network Security, and Firewall.
Powered by